WO2024021580A1 - Security authentication method for user terminal to access network, apparatus, and electronic device - Google Patents

Security authentication method for user terminal to access network, apparatus, and electronic device Download PDF

Info

Publication number
WO2024021580A1
WO2024021580A1 PCT/CN2023/077193 CN2023077193W WO2024021580A1 WO 2024021580 A1 WO2024021580 A1 WO 2024021580A1 CN 2023077193 W CN2023077193 W CN 2023077193W WO 2024021580 A1 WO2024021580 A1 WO 2024021580A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
user terminal
user
network
authentication
Prior art date
Application number
PCT/CN2023/077193
Other languages
French (fr)
Chinese (zh)
Inventor
李燕
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024021580A1 publication Critical patent/WO2024021580A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present disclosure relates to the field of mobile communication technology, and in particular, to a security authentication method, device and electronic equipment for user terminal access to the network.
  • the fifth generation mobile communication technology (5G) network has introduced three major business scenarios.
  • the three major business scenarios have different security requirements based on their own characteristics. They will subsequently evolve to the sixth generation mobile communication technology (5G).
  • the 6th Generation Mobile Communication Technology (6G) network will further expand application scenarios, thus further increasing the personalized demand for security.
  • the present disclosure provides a security authentication method, device and electronic equipment for user terminal access to the network to solve the problem that the existing 5G security authentication process uses the same level of security authentication and key agreement processes, and its flexibility is no longer sufficient. Issues related to personalized security requirements for a variety of different business scenarios.
  • the present disclosure provides a security authentication method for user terminal access to the network, which is applied to the security algorithm negotiation function SANF network element.
  • the method includes: when the user terminal accesses the network, obtaining the user terminal and the access network
  • the security information includes the terminal type of the user terminal, the user subscription ID of the user terminal, and the type of access network; determine the configuration parameters used to generate the security configuration file based on the terminal type, user subscription ID, and access network type. ; Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file.
  • the present disclosure also provides a security authentication device for user terminal access to the network, which is applied to the security algorithm negotiation function SANF network element.
  • the device includes: an acquisition module, a determination module, and a transfer module.
  • the acquisition module is configured to obtain the security information of the user terminal and the access network.
  • the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network;
  • the determination module is configured to obtain the security information based on the terminal type and the user subscription identification. and the type of access network to determine the configuration parameters used to generate the security configuration file;
  • the delivery module is configured to generate the security configuration file based on the configuration parameters and deliver the security configuration file to the user terminal for the user terminal to complete according to the security configuration file Security authentication process for accessing the network.
  • the present disclosure also provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus; the memory is used to store the computer.
  • Program used to implement the steps of the security authentication method for user terminal access to the network according to any embodiment of the first aspect when executing the program stored in the memory.
  • the present disclosure also provides a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the user terminal accesses the network as described in any embodiment of the first aspect. Steps of security authentication method.
  • Figure 1 is a schematic flow chart of a security authentication method for user terminal access to the network provided by the present disclosure
  • FIG. 2 is a schematic structural diagram of a security algorithm negotiation function SANF network element provided by the present disclosure
  • Figure 3 is a schematic flowchart of generating a security configuration file provided by the present disclosure
  • Figure 4 is a schematic flow chart of a user terminal authentication response provided by the present disclosure
  • Figure 5 is a schematic flowchart of obtaining security information provided by the present disclosure
  • Figure 6 is a schematic structural diagram of a security authentication device for user terminal access to the network provided by the present disclosure
  • Figure 7 is a schematic structural diagram of an electronic device provided by the present disclosure.
  • Figure 1 is a schematic flow chart of a security authentication method for user terminal access to a network provided by the present disclosure.
  • the security authentication method for user terminal access to the network is applied to the security algorithm negotiation function SANF network element, and the method may include the following steps 101 to 103.
  • Step 101 When the user terminal accesses the network, obtain the security information of the user terminal and the access network.
  • the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of the access network.
  • the security authentication method for user terminal access to the network is applied to the Security Algorithm Negotiation Function (SANF) network element.
  • the SANF network element can be the Unified Data Management (Unified Data) network element on the home network side. Management, referred to as UDM), or a logical function independent of UDM network elements.
  • the main functional modules of the SANF network element may include a user and network security information collection module, a security algorithm analysis and decision-making module, and a security differentiated configuration file delivery module.
  • the user and network security information collection module is configured to collect information such as the terminal type of the user terminal (User Equipment, referred to as UE), the type of access network, and the user subscription identification of the user terminal.
  • UE User Equipment
  • the security algorithm analysis and decision-making module is configured to analyze and make judgments on the collected user information and security capabilities, combined with network-related information, and select appropriate authentication mode, security algorithm, key length and other security information data.
  • the security differentiated configuration file delivery module is configured to generate differentiated security configuration files from the selected security information data, and provides guidance and configuration for subsequent user terminal authentication, key negotiation, and security algorithm negotiation.
  • the internal structure of the SANF network element is shown in Figure 2.
  • the SANF network element can obtain the security information of the user terminal and the access network.
  • the security information here may include but is not limited to information such as the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network. It should be noted that the terminal types of user terminals can be divided into low-energy terminals, medium-energy terminals, high-energy terminals, etc. according to the terminal capabilities.
  • the user subscription identifier of the user terminal may include a user permanent subscription identifier (Subscription Permanent Identifier, referred to as SUPI) and a user hidden subscription identifier (Subscription Concealed Identifier, referred to as SUCI), where SUCI is the encrypted output result from SUPI.
  • SUPI User Permanent Identifier
  • SUCI User hidden subscription identifier
  • the types of access networks may include 3GPP access networks and Non-3GPP access networks, where the 3GPP access network
  • the access network refers to the access network defined by the 3GPP organization, such as 3GPP Long Term Evolution (LTE), Wideband Code Division Multiple Access (WCDMA), Time Division Synchronous Code Division Multiple Access (Time Division-Synchronous Code Division Multiple Access, TD-SCDMA for short), Global System for Mobile Communications (GSM for short), etc.
  • Non-3GPP access network refers to the access network defined by non-3GPP organizations. Access networks, such as Wireless Local Area Networks (WLAN for short), High Rate Packet Data (HRPD for short), etc.
  • WLAN Wireless Local Area Networks
  • HRPD High Rate Packet Data
  • Step 102 Determine configuration parameters for generating a security configuration file based on the terminal type, user subscription identification, and access network type.
  • the SANF network element can determine the capabilities of the user terminal and access network based on the terminal type, user subscription identification and access network type, as well as the security requirements of the user terminal in the current business scenario, and then determine the security requirements of the user terminal according to the user Based on the capabilities of the terminal and access network, as well as the security requirements of the user terminal in the current business scenario, the configuration parameters of the security profile corresponding to the user terminal are determined.
  • the configuration parameters of the security profile may include, but are not limited to, parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, parameters used to characterize the key length, and the like.
  • the authentication mode types here can include the existing 5G-AKA and EAP-AKA', and other authentication modes can also be introduced, such as EAP-TLS, or even to adapt to different application scenarios and different Security requirements can introduce lightweight authentication mode or heavy authentication mode;
  • the key derivation algorithm here can include national secret algorithms SM3, SM4, and other key derivation algorithms required or specified by enterprises or operators; Key length supports 128bits, 256bits, 512bits, etc.
  • Step 103 Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file.
  • the SANF network element can generate a security profile (SP for short) based on the configuration parameters and pass the security profile to the user terminal.
  • SP security profile
  • the user terminal performs security configuration production based on the security profile and generates own security configuration file, and use its own security configuration file to generate the parameters required for authentication and key derivation, thereby completing the security authentication process for accessing the network, as well as subsequent security processing and security protection processes, to achieve secure access to user terminals. Enter the network.
  • a security algorithm negotiation function SANF network element can be added to the network side.
  • the SANF network element generates a network element that matches the user terminal and the access network according to the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network.
  • the security profile of the access network capabilities and security requirements, and the security profile is passed to the user terminal, so that The user terminal completes the security authentication process for accessing the network based on the security configuration file.
  • differentiated security configuration files can be generated for different terminal types, different access network types, and different user subscription IDs in different business scenarios to achieve differentiated security authentication.
  • the above step 102, determining the configuration parameters for generating a security configuration file according to the terminal type, user subscription identification and access network type includes: receiving the user subscription sent by the unified data management UDM network element message and the authentication mode type supported by the user terminal and the access network.
  • the user subscription message is obtained by the UDM network element based on the user subscription identifier.
  • the authentication mode type supported by the user terminal and the access network is obtained by the UDM network element based on the user subscription.
  • the identification is obtained from the authentication credential storage ARPF network element; based on the user subscription message, the authentication mode type supported by the user terminal and access network, as well as the obtained terminal type and access network type, determine the security configuration file used to generate Configuration parameters.
  • the SANF network element can interact with the unified data management UDM network element to determine configuration parameters for generating a security configuration file.
  • the UDM network element can obtain the user subscription message based on the user subscription identifier, and the UDM network element can also obtain the user subscription message from the Authentication Credential Repository and Processing Function (ARPF) network element based on the user subscription identifier.
  • ARPF Authentication Credential Repository and Processing Function
  • the UDM network element can then cancel the user subscription, the authentication mode type supported by the user terminal and the access network, and the obtained terminal type and access network type.
  • the SANF network element determines the method used to generate the security configuration file based on the user subscription message, the authentication mode type supported by the user terminal and the access network, and the obtained terminal type and access network type.
  • Configuration parameters as shown in Figure 3.
  • the user subscription messages here include but are not limited to application layer authentication and key management subscription (i.e. AMKA subscription), authentication subscription (i.e. Authentication subscription), and key derivation algorithm subscription (i.e. Key derivation algorithm subscription) , Key length subscription (ie Key length subscription), etc.
  • the UDM network element when the user subscription identifier is a user-hidden subscription identifier type, the UDM network element needs to decrypt the user subscription identifier through the subscription identifier decryption function SIDF network element, and based on the decrypted user subscription
  • the identification obtains user subscription messages, user credentials, and authentication mode types supported by user terminals and access networks.
  • the SIDF network element decrypts the user subscription identity based on the user credentials.
  • the user credentials are obtained by the UDM network element from ARPF based on the user subscription identity. Obtained by the network element; when the user subscription identifier is the user permanent subscription identifier, the UDM network element directly obtains the user subscription message, user credentials, and the authentication mode type supported by the user terminal and access network based on the user subscription identifier.
  • the UDM network element when the user subscription identifier is the user hidden subscription identifier type (ie SUCI), the UDM network element You can also use field information such as protection scheme ID and home network public key ID in SUCI to obtain user credentials and authentication supported by the user terminal and access network from the ARPF network element. Schema type.
  • the UDM network element can also decrypt the user subscription identifier from the Subscription Identifier De-concealing Function (SIDF) network element based on the user credentials, and then use the decrypted user subscription identifier to obtain the user subscription message.
  • SIDF Subscription Identifier De-concealing Function
  • the UDM network element can also directly obtain the user credentials and the authentication mode type supported by the user terminal and access network from the ARPF network element based on the SUPI. UDM network elements can also directly obtain user subscription messages based on user subscription identifiers.
  • SUPI user permanent subscription identifier type
  • the above step 103, transmitting the security configuration file to the user terminal includes: transmitting the security configuration file to the UDM network element, where the UDM network element is used to use the security configuration file as a new information element field, perform integrity protection processing on the newly added information element field, and pass the integrity-protected information element field to the user terminal through the authentication server function AUSF network element and the security anchor function SEAF network element in sequence.
  • the security configuration file can be passed to the UDM network element.
  • the UDM network element can use the security configuration file as a new information element (Information Element) field.
  • Information Element Information Element
  • SP IE Authentication Server Function
  • AUSF Authentication Server Function
  • SEAF SEcurity Anchor Function
  • the UDM network element is also configured to generate a home environment authentication vector according to the security configuration file, and pass the authentication token and the information element field after integrity protection processing in the home environment authentication vector through the AUSF network element in sequence. and SEAF network element to the user terminal; wherein, the AUSF network element is used to determine the service environment authentication vector based on the home environment authentication vector, and send the service environment authentication vector and the information element field after integrity protection processing to the SEAF network element; SEAF The network element is used to send the service environment authentication vector and the information element field after integrity protection processing to the user terminal; the service environment authentication vector includes the authentication token; the user terminal is used to perform timeliness verification based on the authentication token and verify the integrity The protected information element fields are subjected to integrity verification. If the timeliness verification and integrity verification are successful, the security authentication process of the access network is completed based on the information element fields with successful integrity verification.
  • the UDM network element can also generate a home environment authentication vector (5G Home Environment Authentication Vector, referred to as 5G HE AV), and uses the authentication token (Authentication Token, referred to as AUTN) in the home environment authentication vector and the information element field after integrity protection processing as the authentication response message (i.e. in Figure 4 Nudm_UEAuthentication_Get Response) is passed to the AUSF network element.
  • 5G Home Environment Authentication Vector referred to as 5G HE AV
  • AUTN authentication token
  • Nudm_UEAuthentication_Get Response Nudm_UEAuthentication_Get Response
  • the AUSF network element can determine the service environment authentication vector (5G Service Environment Authentication Vector, referred to as 5G SE AV) based on the home environment authentication vector, and combine the authentication token in the service environment authentication vector with
  • the information element field after integrity protection is sent to the SEAF network element as an authentication response message (i.e., Nausf_UEAuthentication_Authenticate Response in Figure 4); the SEAF network element can use the service environment authentication vector and the information element field after integrity protection as an authentication request. (i.e., the Authentication Request in Figure 4) is sent to the user terminal; finally, the user terminal can perform timeliness verification based on the authentication token and integrity verification of the information element field after integrity protection processing.
  • the network side uses the private key related to the user terminal to protect the integrity of the SP IE.
  • the user terminal After receiving the authentication request (ie, Authentication Request) from the network side, the user terminal verifies the timeliness of the authentication request message through the AUTN in the authentication request. After confirming that the timeliness of the authentication request message is acceptable, the integrity of the SP IE is verified through the public key of the network side. If the integrity verification fails, an authentication failure reply is sent to the network side; if the integrity verification is successful, the SP IE is Generate relevant security configuration files and subsequent key derivation for information element fields with successful sexual verification, and reply to the network side authentication response message (i.e. Authentication Response in Figure 4), thereby completing the security authentication process of the access network.
  • This method can effectively prevent SP IE from being tampered with during the transmission process and improve the security of secure configuration file transmission.
  • the above step 101 when the user terminal accesses the network, obtains the security information of the user terminal and the access network, including: when the user terminal requests to access the network, receiving the UDM network element The security information sent, wherein the UDM network element is used to parse the first authentication request sent by the AUSF network element to obtain the security information carried in the first authentication request, and transfer the security information Sent to the SANF network element; where the first authentication request is generated by the AUSF network element after receiving the second authentication request sent by the SEAF network element, and the second authentication request is generated by the SEAF network element after receiving the registration sent by the user terminal.
  • the second authentication request carries the terminal type, user subscription identification and access network type.
  • the registration request is generated when the user terminal accesses the network.
  • the registration request carries the terminal type and user Subscription ID.
  • the SANF network element can obtain security information from the UDM network element.
  • the user terminal UE initiates a registration request (i.e. Register Request in Figure 5) on the access network, and the registration request message carries the terminal type UE type, SUCI or 5G global temporary UE identifier (5G Globally Unique Temporary UE Identity, referred to as 5G-GUTI), the registration request is sent to the security anchor function (SEAF, SEcurity Anchor Function) network element of the service network.
  • SEAF SEcurity Anchor Function
  • the SEAF network element sends a second authentication request (i.e., the Nausf_UEAuthentication_Authenticate Request message in Figure 5) calls the Nausf_UEAuthentication service to the AUSF network element.
  • the second authentication request carries SUCI or SUPI mapping 5G-GUTI, and the Serving Network Name (SNN for short), where the Serving Network Name It may include the service network identifier (ie SN ID) and the access network type (ie access network type).
  • the AUSF network element verifies the service network by comparing whether the service network name carried in the second authentication request message is consistent with the default service network name of the service network where the user terminal is located.
  • the SEAF network element Whether the SEAF network element has the right to use the service network name in the second authentication request message, and at the same time verify the type of the corresponding access network. If the service network is not authorized to use the service network name in the second authentication request message, then "the service network is not authorized" is replied. Otherwise, the AUSF network element considers that the service network is authorized to use the service network name in the second authentication request message. At this time, the AUSF network element initiates a first authentication request (ie, the Nudm_UEAuthentication_Get Request message in Figure 5) to the UDM network element. The first authentication request carries SUCI or SUPI, and the service network name. After receiving the Nudm_UEAuthentication_Get Request message, the UDM network element sends the security information carried in the message to the SANF network element, and the SANF network element generates a security profile (Security profile).
  • a security profile Security profile
  • Figure 5 is an improvement made in the existing 5G security authentication process.
  • a SANF network element is added to the existing process, and when the user terminal initiates a registration request on the access network, in addition to carrying SUCI or 5G- In addition to GUTI, it can also carry UE type.
  • the SEAF network element sends the second authentication request to the AUSF network element and the AUSF network element sends the first authentication request to the UDM network element, in addition to carrying the SN ID, SUCI or SUPI
  • the configuration parameters include parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, and parameters used to characterize the key length.
  • the following takes the intensive access scenario of mMTC as an example.
  • 5G requires an access volume of millions per square kilometer
  • 6G requires an access volume of tens of millions per square kilometer.
  • Such intensive terminal access will have a significant impact on network access authentication.
  • SANF network elements can flexibly configure the user's Security Profile and select the appropriate authentication mode and security processing based on the terminal type or user subscription data.
  • the UE when accessing the network, the UE initiates a registration request carrying the terminal type, which is a certain type of low-energy terminal in the mMTC.
  • the network side selects a matching lightweight access authentication mode, a simplified key derivation algorithm, and appropriate key length and other security configurations for the UE based on the UE's terminal type and subscription data information.
  • Security profile the network side generates a simplified 5G HE AV based on the generated Security profile, and indicates the SP information to the UE through the SP IE; finally, the UE side completes the interaction with the network side based on the SP IE indication information and the authentication information of the network side.
  • Security certification process when accessing the network, the UE initiates a registration request carrying the terminal type, which is a certain type of low-energy terminal in the mMTC.
  • the security capability negotiation between the UE and the network is processed in a unified manner, the UE's own capabilities and subscription information are comprehensively considered, and differentiated automatic matching is formed based on the UE's capabilities, UE classification, and user subscription tendencies. In this way, the following technical effects are achieved.
  • the authentication mode can be expanded into multiple authentication modes, not only including the existing 5G-AKA and EAP-AKA', but also other authentication modes can be introduced, such as EAP-TLS, even to adapt to different application scenarios. Based on different security requirements, lightweight authentication mode or heavy authentication mode can be introduced.
  • the current key derivation algorithm is solidified.
  • the national secret algorithms SM3 and SM4 can be introduced into the key derivation algorithm. Even to meet the special needs of industry private networks, key derivation algorithms required or specified by enterprises or operators can be introduced.
  • the current key length used in 5G authentication and key negotiation is 128 bits, and the key length is one of the parameters that directly reflects security capabilities.
  • This encryption algorithm with a fixed key length cannot reflect the differences in security requirements. For scenarios with high security requirements, such as applications that prevent quantum attacks, 128 bits can no longer meet the security requirements, so longer key lengths need to be supported.
  • the scalable key length does not mean arbitrarily specifying the key length, but supports multiple key lengths (such as supporting 128bits, 256bits, etc.). According to the scenario and security requirements, the key length can be selected to meet current needs.
  • Security capability expansion includes but is not limited to the three parameters described above, and can be flexibly expanded according to subsequent needs.
  • an arbitration negotiation function to match and negotiate security capabilities according to security requirements, and provide optimal security combinations for different application scenarios.
  • the introduction of the Full Algorithm Negotiation Function can automatically match the parameters described above according to the user's subscription mechanism, terminal type or access network type.
  • this disclosure is not a combination of simple technologies, but uses the concept of big data to collect data such as users' security capabilities and subscription information. Through comprehensive analysis and decision algorithms, it can provide differences for different terminals and different user tendencies. Safe matching.
  • Figure 6 shows a security authentication device for user terminal access to the network provided by the present disclosure, which is applied to the security algorithm negotiation function SANF network element.
  • the device 600 includes: an acquisition module 601, a determination module 602, and a transfer module 603.
  • the acquisition module 601 is configured to obtain the security information of the user terminal and the access network.
  • the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of access network;
  • the determination module 602 is configured to obtain the security information according to the terminal type. type, user subscription identification and access network type to determine the configuration parameters used to generate a security configuration file;
  • the delivery module 603 is configured to generate a security configuration file based on the configuration parameters and deliver the security configuration file to the user terminal for use by the user.
  • the terminal completes the security authentication process for accessing the network based on the security configuration file.
  • the determining module 602 includes: a first receiving sub-module configured to receive a user subscription message sent by the unified data management UDM network element and the authentication mode type supported by the user terminal and the access network, wherein the user The subscription message is obtained by the UDM network element based on the user subscription identifier.
  • the authentication mode type supported by the user terminal and access network is obtained by the UDM network element from the authentication certificate storage ARPF network element based on the user subscription identifier; the determination sub-module is configured to be based on The user subscription message, the authentication mode type supported by the user terminal and the access network, and the acquired terminal type and access network type determine the configuration parameters used to generate the security configuration file.
  • the UDM network element when the user subscription identifier is a user-hidden subscription identifier type, the UDM network element needs to decrypt the user subscription identifier through the subscription identifier decryption function SIDF network element, and based on the decrypted user subscription
  • the identification obtains user subscription messages, user credentials, and authentication mode types supported by user terminals and access networks.
  • the SIDF network element decrypts the user subscription identity based on the user credentials.
  • the user credentials are obtained by the UDM network element from ARPF based on the user subscription identity. Obtained by the network element; when the user subscription identifier is the user permanent subscription identifier, the UDM network element directly obtains the user subscription message, user credentials, and the authentication mode type supported by the user terminal and access network based on the user subscription identifier.
  • the transfer module 603 includes: a transfer sub-module configured to transfer the security configuration file to the UDM network element, where the UDM network element is used to use the security configuration file as a new information element field, and The newly added information element fields are processed for integrity protection, and the information element fields after integrity protection are sequentially delivered to the user terminal through the authentication server function AUSF network element and the security anchor function SEAF network element.
  • the UDM network element is also configured to generate a home environment authentication vector according to the security configuration file, and pass the authentication token and the information element field after integrity protection processing in the home environment authentication vector through the AUSF network element in sequence. and SEAF network element to the user terminal; wherein, the AUSF network element is used to determine the service environment authentication vector based on the home environment authentication vector, and send the service environment authentication vector and the information element field after integrity protection processing to the SEAF network element; SEAF The network element is used to send the service environment authentication vector and the information element field after integrity protection processing to the user terminal; the service environment authentication vector includes the authentication token; the user terminal is used to perform timeliness verification based on the authentication token and verify the integrity The protected information element fields are subjected to integrity verification. If the timeliness verification and integrity verification are successful, the security authentication process of the access network is completed based on the information element fields with successful integrity verification.
  • the acquisition module 601 includes: a second receiving submodule configured to receive the security information sent by the UDM network element when the user terminal requests to access the network, wherein the UDM network element is used to receive
  • the first authentication request is parsed to obtain the security information carried in the first authentication request, and the security information is sent to the SANF network element; where the first authentication request is AUSF
  • the network element generates the second authentication request when it receives the second authentication request sent by the SEAF network element.
  • the second authentication request is generated by the SEAF network element when it receives the registration request sent by the user terminal.
  • the second authentication request carries Terminal type, user subscription identification and access network type.
  • the registration request is generated when the user terminal accesses the network.
  • the registration request carries the terminal type and user subscription identification.
  • the configuration parameters include parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, and parameters used to characterize the key length.
  • the security authentication device 600 for user terminal access to the network can implement the steps of the security authentication method for user terminal access to the network as provided in any of the foregoing method embodiments, and can achieve the same technical effect, which will not be discussed here. Let’s go over them one by one.
  • the present disclosure provides an electronic device, including a processor 711, a communication interface 712, a memory 713, and a communication bus 714.
  • the processor 711, the communication interface 712, and the memory 713 complete interactions with each other through the communication bus 714.
  • the memory 713 is used to store computer programs; in one embodiment of the present disclosure, the processor 711 is used to implement the user terminal access network provided by any of the foregoing method embodiments when executing the program stored on the memory 713
  • the security authentication method includes: when the user terminal accesses the network, obtaining security information of the user terminal and the access network.
  • the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of the access network; Determine the configuration parameters used to generate a security configuration file based on the terminal type, user subscription identification and access network type; generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal for the user terminal to configure according to the security configuration
  • the file completes the security authentication process for accessing the network.
  • the present disclosure also provides a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the steps of the security authentication method for user terminal access to the network as provided in any of the foregoing method embodiments are implemented.
  • the security information of the user terminal and the access network is obtained.
  • the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of access network; according to The terminal type, user subscription ID and access network type determine the configuration parameters used to generate security configuration files; Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file.
  • the security algorithm negotiation function SANF network element can be added to the network side.
  • the SANF network element generates a network element that matches the user terminal and the type of the access network based on the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network. Access network capabilities and security requirements security configuration file, and pass the security configuration file to the user terminal, so that the user terminal completes the security authentication process of accessing the network based on the security configuration file.
  • differentiated security configuration files can be generated for different terminal types, different access network types, and different user subscription IDs in different business scenarios to achieve differentiated security authentication.
  • the newly added SANF network elements can be used to generate differentiated security configuration files based on different terminal types, different access network types, and different user subscription IDs in different business scenarios, thereby achieving differentiated security authentication.

Abstract

The present disclosure relates to a security authentication method for a user terminal to access a network, an apparatus, and an electronic device. The method is applied to a security algorithm negotiation function (SANF) network element, and the method comprises: when a user terminal accesses a network, acquiring security information of the user terminal and of the accessed network, the security information comprising the terminal type of the user terminal, a user subscription identifier of the user terminal, and the type of the accessed network; according to the terminal type, the user subscription identifier and the type of the accessed network, determining configuration parameters for generating a security configuration file; and generating the security configuration file according to the configuration parameters, and sending the security configuration file to the user terminal, so as to allow the user terminal to complete the security authentication process of the accessed network according to the security configuration file.

Description

用户终端接入网络的安全认证方法、装置及电子设备Security authentication method, device and electronic equipment for user terminal access to network
相关申请的交叉引用Cross-references to related applications
本公开要求享有2022年07月29日提交的名称为“用户终端接入网络的安全认证方法、装置及电子设备”的中国专利申请CN202210909822.6的优先权,其全部内容通过引用并入本公开中。This disclosure claims priority to Chinese patent application CN202210909822.6 titled "Security Authentication Method, Device and Electronic Equipment for User Terminal Access Network" submitted on July 29, 2022, the entire content of which is incorporated into this disclosure by reference. middle.
技术领域Technical field
本公开涉及移动通信技术领域,尤其涉及一种用户终端接入网络的安全认证方法、装置及电子设备。The present disclosure relates to the field of mobile communication technology, and in particular, to a security authentication method, device and electronic equipment for user terminal access to the network.
背景技术Background technique
第五代移动通信技术(5th Generation Mobile Communication Technology,简称5G)网络引入了三大业务场景,三大业务场景基于自身的特性对安全的需求各有不同,后续演进到第六代移动通信技术(6th Generation Mobile Communication Technology,简称6G)网络将进一步扩展应用场景,因而将进一步加大对安全的个性化需求。The fifth generation mobile communication technology (5G) network has introduced three major business scenarios. The three major business scenarios have different security requirements based on their own characteristics. They will subsequently evolve to the sixth generation mobile communication technology (5G). The 6th Generation Mobile Communication Technology (6G) network will further expand application scenarios, thus further increasing the personalized demand for security.
目前,现有的5G安全认证流程是采用相同级别的安全认证和密钥协商流程,其灵活性已不足以应对多种不同的业务场景的个性化安全需要。因此,如何根据用户终端和接入网络的能力和安全需求进行协商实现差异化的安全认证,成为亟待解决的技术问题。Currently, the existing 5G security authentication process uses the same level of security authentication and key agreement processes, which is no longer flexible enough to meet the personalized security needs of a variety of different business scenarios. Therefore, how to negotiate and implement differentiated security authentication based on the capabilities and security requirements of user terminals and access networks has become an urgent technical issue to be solved.
发明内容Contents of the invention
本公开提供了一种用户终端接入网络的安全认证方法、装置及电子设备,以解决现有的5G安全认证流程是采用相同级别的安全认证和密钥协商流程,其灵活性已不足以应对多种不同的业务场景的个性化安全需要的问题。The present disclosure provides a security authentication method, device and electronic equipment for user terminal access to the network to solve the problem that the existing 5G security authentication process uses the same level of security authentication and key agreement processes, and its flexibility is no longer sufficient. Issues related to personalized security requirements for a variety of different business scenarios.
第一方面,本公开提供了一种用户终端接入网络的安全认证方法,应用于安全算法协商功能SANF网元,方法包括:在用户终端接入网络的情况下,获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型;根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数;根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。 In a first aspect, the present disclosure provides a security authentication method for user terminal access to the network, which is applied to the security algorithm negotiation function SANF network element. The method includes: when the user terminal accesses the network, obtaining the user terminal and the access network The security information includes the terminal type of the user terminal, the user subscription ID of the user terminal, and the type of access network; determine the configuration parameters used to generate the security configuration file based on the terminal type, user subscription ID, and access network type. ; Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file.
第二方面,本公开还提供了一种用户终端接入网络的安全认证装置,应用于安全算法协商功能SANF网元,装置包括:获取模块、确定模块、传递模块。In a second aspect, the present disclosure also provides a security authentication device for user terminal access to the network, which is applied to the security algorithm negotiation function SANF network element. The device includes: an acquisition module, a determination module, and a transfer module.
获取模块,配置为获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型;确定模块,配置为根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数;传递模块,配置为根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。The acquisition module is configured to obtain the security information of the user terminal and the access network. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network; the determination module is configured to obtain the security information based on the terminal type and the user subscription identification. and the type of access network to determine the configuration parameters used to generate the security configuration file; the delivery module is configured to generate the security configuration file based on the configuration parameters and deliver the security configuration file to the user terminal for the user terminal to complete according to the security configuration file Security authentication process for accessing the network.
第三方面,本公开还提供了一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;存储器,用于存放计算机程序;处理器,用于执行存储器上所存放的程序时,实现第一方面任一项实施例用户终端接入网络的安全认证方法的步骤。In a third aspect, the present disclosure also provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus; the memory is used to store the computer. Program; processor, used to implement the steps of the security authentication method for user terminal access to the network according to any embodiment of the first aspect when executing the program stored in the memory.
第四方面,本公开还提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现如第一方面任一项实施例所述的用户终端接入网络的安全认证方法的步骤。In a fourth aspect, the present disclosure also provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the user terminal accesses the network as described in any embodiment of the first aspect. Steps of security authentication method.
附图说明Description of drawings
此处的附图被并入说明书中并构成本公开的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
为了更清楚地说明本公开或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the present disclosure or the prior art, the drawings needed to be used in the embodiments or description of the prior art will be briefly introduced below. It is obvious that for those of ordinary skill in the art, Other drawings can also be obtained based on these drawings without incurring any creative effort.
图1为本公开提供的一种用户终端接入网络的安全认证方法的流程示意图;Figure 1 is a schematic flow chart of a security authentication method for user terminal access to the network provided by the present disclosure;
图2为本公开提供的一种安全算法协商功能SANF网元的结构示意图;Figure 2 is a schematic structural diagram of a security algorithm negotiation function SANF network element provided by the present disclosure;
图3为本公开提供的一种生成安全配置文件的流程示意图;Figure 3 is a schematic flowchart of generating a security configuration file provided by the present disclosure;
图4为本公开提供的一种用户终端认证响应的流程示意图;Figure 4 is a schematic flow chart of a user terminal authentication response provided by the present disclosure;
图5为本公开提供的一种获取安全信息的流程示意图;Figure 5 is a schematic flowchart of obtaining security information provided by the present disclosure;
图6为本公开提供的一种用户终端接入网络的安全认证装置的结构示意图;Figure 6 is a schematic structural diagram of a security authentication device for user terminal access to the network provided by the present disclosure;
图7为本公开提供的一种电子设备的结构示意图。 Figure 7 is a schematic structural diagram of an electronic device provided by the present disclosure.
具体实施方式Detailed ways
为使本公开的目的、技术方案和优点更加清楚,下面将结合本公开中的附图,对本公开中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开的一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the technical solutions in the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings in the present disclosure. Obviously, the described embodiments are part of the implementation of the present disclosure. examples, not all examples. Based on the embodiments in this disclosure, all other embodiments obtained by those of ordinary skill in the art without any creative efforts fall within the scope of protection of this disclosure.
参见图1,图1为本公开提供的一种用户终端接入网络的安全认证方法的流程示意图。该用户终端接入网络的安全认证方法应用于安全算法协商功能SANF网元,该方法可以包括如下步骤101至103。Referring to Figure 1, Figure 1 is a schematic flow chart of a security authentication method for user terminal access to a network provided by the present disclosure. The security authentication method for user terminal access to the network is applied to the security algorithm negotiation function SANF network element, and the method may include the following steps 101 to 103.
步骤101、在用户终端接入网络的情况下,获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型。Step 101: When the user terminal accesses the network, obtain the security information of the user terminal and the access network. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of the access network.
需要说明的是,该用户终端接入网络的安全认证方法应用于安全算法协商功能(Security Algorithm Negotiation Function,简称为SANF)网元,该SANF网元可以为归属网络侧的统一数据管理(Unified Data Management,简称为UDM)上的逻辑功能,或者为独立于UDM网元的逻辑功能。该SANF网元主要的功能模块可以包括用户和网络安全信息收集模块、安全算法分析及决策模块和安全差异化配置文件传递模块。其中,用户和网络安全信息收集模块,配置为收集用户终端(User Equipment,简称为UE)的终端类型、接入网络的类型、用户终端的用户订阅标识等信息。安全算法分析及决策模块,配置为对收集到的用户信息和安全能力等,结合网络相关的信息进行分析和判决,选择合适的认证模式、安全算法、密钥长度等安全信息数据。安全差异化配置文件传递模块,配置为将选择的安全信息数据生成差异化的安全配置文件,为用户终端后续认证和密钥协商、安全算法协商提供指导和配置。该SANF网元的内部结构如图2所示。It should be noted that the security authentication method for user terminal access to the network is applied to the Security Algorithm Negotiation Function (SANF) network element. The SANF network element can be the Unified Data Management (Unified Data) network element on the home network side. Management, referred to as UDM), or a logical function independent of UDM network elements. The main functional modules of the SANF network element may include a user and network security information collection module, a security algorithm analysis and decision-making module, and a security differentiated configuration file delivery module. Among them, the user and network security information collection module is configured to collect information such as the terminal type of the user terminal (User Equipment, referred to as UE), the type of access network, and the user subscription identification of the user terminal. The security algorithm analysis and decision-making module is configured to analyze and make judgments on the collected user information and security capabilities, combined with network-related information, and select appropriate authentication mode, security algorithm, key length and other security information data. The security differentiated configuration file delivery module is configured to generate differentiated security configuration files from the selected security information data, and provides guidance and configuration for subsequent user terminal authentication, key negotiation, and security algorithm negotiation. The internal structure of the SANF network element is shown in Figure 2.
在一示例性实施例中,在用户终端接入网络的情况下,该SANF网元可以获取到用户终端和接入网络的安全信息。此处的安全信息可以包括但不限于用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型等信息。需要说明的是,用户终端的终端类型可以根据终端的能力划分为低能类终端、中能类终端、高能类终端等。用户终端的用户订阅标识可以包括用户永久订阅标识符(Subscription Permanent Identifier,简称为SUPI)和用户隐藏订阅标识符(Subscription Concealed Identifier,简称为SUCI),其中,SUCI是来自SUPI加密后的输出结果。接入网络的类型可以包括3GPP接入网络和Non-3GPP接入网络,其中,3GPP接 入网络是指由3GPP组织所定义的接入网络,如3GPP长期演进技术(Long Term Evolution,简称为LTE)、宽带码分多址(Wideband Code Division Multiple Access,简称为WCDMA)、时分同步码分多址(Time Division-Synchronous Code Division Multiple Access,简称为TD-SCDMA)、全球移动通信系统(Global System for Mobile Communications,简称为GSM)等,Non-3GPP接入网络是指非3GPP组织所定义的接入网络,如无限局域网(Wireless Local Area Networks,简称为WLAN)、高速分组数据(High Rate Packet Data),简称为HRPD)等。In an exemplary embodiment, when the user terminal accesses the network, the SANF network element can obtain the security information of the user terminal and the access network. The security information here may include but is not limited to information such as the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network. It should be noted that the terminal types of user terminals can be divided into low-energy terminals, medium-energy terminals, high-energy terminals, etc. according to the terminal capabilities. The user subscription identifier of the user terminal may include a user permanent subscription identifier (Subscription Permanent Identifier, referred to as SUPI) and a user hidden subscription identifier (Subscription Concealed Identifier, referred to as SUCI), where SUCI is the encrypted output result from SUPI. The types of access networks may include 3GPP access networks and Non-3GPP access networks, where the 3GPP access network The access network refers to the access network defined by the 3GPP organization, such as 3GPP Long Term Evolution (LTE), Wideband Code Division Multiple Access (WCDMA), Time Division Synchronous Code Division Multiple Access (Time Division-Synchronous Code Division Multiple Access, TD-SCDMA for short), Global System for Mobile Communications (GSM for short), etc. Non-3GPP access network refers to the access network defined by non-3GPP organizations. Access networks, such as Wireless Local Area Networks (WLAN for short), High Rate Packet Data (HRPD for short), etc.
步骤102、根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数。Step 102: Determine configuration parameters for generating a security configuration file based on the terminal type, user subscription identification, and access network type.
在该步骤中,该SANF网元可以根据终端类型、用户订阅标识和接入网络的类型,确定用户终端和接入网络的能力,以及用户终端的在当前业务场景下的安全需求,进而根据户终端和接入网络的能力,以及用户终端的在当前业务场景下的安全需求进行,确定出该用户终端对应的安全配置文件的配置参数。在一示例性实施例中,该安全配置文件的配置参数可以包括但不限于用于表征认证模式类型的参数、用于表征密钥推演算法的参数和用于表征密钥长度的参数等。需要说明的是,此处的认证模式类型可以包括现有的5G-AKA和EAP-AKA’,也可以将其他认证模式引入进来,如EAP-TLS,甚至是为适应不同的应用场景和不同的安全需求,可以引入轻量化的认证模式或重量化认证模式;此处的密钥推演算法可以包括国密算法SM3、SM4,以及企业或运营商要求或指定的其他密钥推演算法;此处的密钥长度支持128bits、256bits、512bits等。In this step, the SANF network element can determine the capabilities of the user terminal and access network based on the terminal type, user subscription identification and access network type, as well as the security requirements of the user terminal in the current business scenario, and then determine the security requirements of the user terminal according to the user Based on the capabilities of the terminal and access network, as well as the security requirements of the user terminal in the current business scenario, the configuration parameters of the security profile corresponding to the user terminal are determined. In an exemplary embodiment, the configuration parameters of the security profile may include, but are not limited to, parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, parameters used to characterize the key length, and the like. It should be noted that the authentication mode types here can include the existing 5G-AKA and EAP-AKA', and other authentication modes can also be introduced, such as EAP-TLS, or even to adapt to different application scenarios and different Security requirements can introduce lightweight authentication mode or heavy authentication mode; the key derivation algorithm here can include national secret algorithms SM3, SM4, and other key derivation algorithms required or specified by enterprises or operators; Key length supports 128bits, 256bits, 512bits, etc.
步骤103、根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。Step 103: Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file.
在该步骤中,该SANF网元可以根据配置参数生成安全配置文件(Security profile,简称为SP),并将该安全配置文件传递给用户终端,用户终端根据该安全配置文件进行安全配置生产,生成自身的安全配置文件,并利用自身的安全配置文件生成认证及密钥推演所需的参数,以此完成接入网络的安全认证流程,以及后续的安全处理和安全保护流程,实现用户终端安全接入网络。In this step, the SANF network element can generate a security profile (SP for short) based on the configuration parameters and pass the security profile to the user terminal. The user terminal performs security configuration production based on the security profile and generates own security configuration file, and use its own security configuration file to generate the parameters required for authentication and key derivation, thereby completing the security authentication process for accessing the network, as well as subsequent security processing and security protection processes, to achieve secure access to user terminals. Enter the network.
在本实施例中,可以在网络侧新增安全算法协商功能SANF网元,由SANF网元根据用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型,生成符合该用户终端和该接入网络能力和安全需求的安全配置文件,并将该安全配置文件传递给该用户终端,使 得用户终端根据该安全配置文件完成接入网络的安全认证流程。这样,可以针对不同业务场景下的不同终端类型、不同接入网络类型,以及不同用户订阅标识,生成差异化的安全配置文件,实现差异化的安全认证。In this embodiment, a security algorithm negotiation function SANF network element can be added to the network side. The SANF network element generates a network element that matches the user terminal and the access network according to the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network. The security profile of the access network capabilities and security requirements, and the security profile is passed to the user terminal, so that The user terminal completes the security authentication process for accessing the network based on the security configuration file. In this way, differentiated security configuration files can be generated for different terminal types, different access network types, and different user subscription IDs in different business scenarios to achieve differentiated security authentication.
在一示例性实施例中,上述步骤102、根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数,包括:接收统一数据管理UDM网元发送的用户订阅消息以及用户终端和接入网络所支持的认证模式类型,其中,用户订阅消息是UDM网元基于用户订阅标识获取得到,用户终端和接入网络所支持的认证模式类型是UDM网元基于用户订阅标识从认证凭证仓储ARPF网元获取得到;根据用户订阅消息、用户终端和接入网络所支持的认证模式类型,以及获取到的终端类型和接入网络的类型,确定用于生成安全配置文件的配置参数。In an exemplary embodiment, the above step 102, determining the configuration parameters for generating a security configuration file according to the terminal type, user subscription identification and access network type, includes: receiving the user subscription sent by the unified data management UDM network element message and the authentication mode type supported by the user terminal and the access network. The user subscription message is obtained by the UDM network element based on the user subscription identifier. The authentication mode type supported by the user terminal and the access network is obtained by the UDM network element based on the user subscription. The identification is obtained from the authentication credential storage ARPF network element; based on the user subscription message, the authentication mode type supported by the user terminal and access network, as well as the obtained terminal type and access network type, determine the security configuration file used to generate Configuration parameters.
在一实施例中,该SANF网元可以与统一数据管理UDM网元进行数据交互,确定用于生成安全配置文件的配置参数。在一示例性实施例中,UDM网元可以基于用户订阅标识获取到用户订阅消息,UDM网元还可以基于该用户订阅标识从认证凭证仓储(Authentication credential Repository and Processing Function,简称为ARPF)网元获取到用户终端和接入网络所支持的认证模式类型,之后UDM网元可以将用户订阅消、用户终端和接入网络所支持的认证模式类型,以及获取到的终端类型和接入网络的类型发送给该SANF网元,该SANF网元根据用户订阅消息、用户终端和接入网络所支持的认证模式类型,以及获取到的终端类型和接入网络的类型,确定用于生成安全配置文件的配置参数,如图3所示。需要说明的是,此处的用户订阅消息包括但不限于应用层的认证与密钥管理订阅(即AMKA subscription)、认证订阅(即Authentication subscription)、密钥推导算法订阅(即Key derivation algorithm subscription)、密钥长度订阅(即Key lenghth subscription)等。In one embodiment, the SANF network element can interact with the unified data management UDM network element to determine configuration parameters for generating a security configuration file. In an exemplary embodiment, the UDM network element can obtain the user subscription message based on the user subscription identifier, and the UDM network element can also obtain the user subscription message from the Authentication Credential Repository and Processing Function (ARPF) network element based on the user subscription identifier. After obtaining the authentication mode type supported by the user terminal and the access network, the UDM network element can then cancel the user subscription, the authentication mode type supported by the user terminal and the access network, and the obtained terminal type and access network type. Sent to the SANF network element, the SANF network element determines the method used to generate the security configuration file based on the user subscription message, the authentication mode type supported by the user terminal and the access network, and the obtained terminal type and access network type. Configuration parameters, as shown in Figure 3. It should be noted that the user subscription messages here include but are not limited to application layer authentication and key management subscription (i.e. AMKA subscription), authentication subscription (i.e. Authentication subscription), and key derivation algorithm subscription (i.e. Key derivation algorithm subscription) , Key length subscription (ie Key length subscription), etc.
在一示例性实施例中,在用户订阅标识为用户隐藏订阅标识符类型的情况下,UDM网元需要通过订阅标识符解密功能SIDF网元对用户订阅标识进行解密,并基于解密后的用户订阅标识获取用户订阅消息、用户凭证以及用户终端和接入网络所支持的认证模式类型,其中,SIDF网元是基于用户凭证对用户订阅标识进行解密,用户凭证是UDM网元基于用户订阅标识从ARPF网元获取得到;在用户订阅标识为用户永久订阅标识符的情况下,UDM网元直接基于用户订阅标识获取用户订阅消息、用户凭证以及用户终端和接入网络所支持的认证模式类型。In an exemplary embodiment, when the user subscription identifier is a user-hidden subscription identifier type, the UDM network element needs to decrypt the user subscription identifier through the subscription identifier decryption function SIDF network element, and based on the decrypted user subscription The identification obtains user subscription messages, user credentials, and authentication mode types supported by user terminals and access networks. The SIDF network element decrypts the user subscription identity based on the user credentials. The user credentials are obtained by the UDM network element from ARPF based on the user subscription identity. Obtained by the network element; when the user subscription identifier is the user permanent subscription identifier, the UDM network element directly obtains the user subscription message, user credentials, and the authentication mode type supported by the user terminal and access network based on the user subscription identifier.
继续参见图3,当用户订阅标识为用户隐藏订阅标识符类型(即SUCI)时,UDM网元 还可以利用SUCI中的保护计划标识(即protection scheme ID)和归属网络公钥标识(Home network public key ID)等字段信息,从ARPF网元获取用户凭证以及用户终端和接入网络所支持的认证模式类型。UDM网元还可以基于用户凭证从订阅标识符解密功能(Subscription Identifier De-concealing Function,简称为SIDF)网元对用户订阅标识进行解密,然后在利用解密后的用户订阅标识获取到用户订阅消息。Continuing to refer to Figure 3, when the user subscription identifier is the user hidden subscription identifier type (ie SUCI), the UDM network element You can also use field information such as protection scheme ID and home network public key ID in SUCI to obtain user credentials and authentication supported by the user terminal and access network from the ARPF network element. Schema type. The UDM network element can also decrypt the user subscription identifier from the Subscription Identifier De-concealing Function (SIDF) network element based on the user credentials, and then use the decrypted user subscription identifier to obtain the user subscription message.
当用户订阅标识为用户永久订阅标识符类型(即SUPI)时,UDM网元还可以直接基于该SUPI从ARPF网元获取用户凭证以及用户终端和接入网络所支持的认证模式类型。UDM网元还可以直接基于用户订阅标识获取到用户订阅消息。When the user subscription identifier is a user permanent subscription identifier type (that is, SUPI), the UDM network element can also directly obtain the user credentials and the authentication mode type supported by the user terminal and access network from the ARPF network element based on the SUPI. UDM network elements can also directly obtain user subscription messages based on user subscription identifiers.
在一示例性实施例中,上述步骤103、将安全配置文件传递给用户终端,包括:将安全配置文件传递给UDM网元,其中,UDM网元用于将安全配置文件作为新增的信息元素字段,并对新增的信息元素字段进行完整性保护处理,将完整性保护处理后的信息元素字段依次通过认证服务器功能AUSF网元和安全锚点功能SEAF网元传递给用户终端。In an exemplary embodiment, the above step 103, transmitting the security configuration file to the user terminal, includes: transmitting the security configuration file to the UDM network element, where the UDM network element is used to use the security configuration file as a new information element field, perform integrity protection processing on the newly added information element field, and pass the integrity-protected information element field to the user terminal through the authentication server function AUSF network element and the security anchor function SEAF network element in sequence.
在一实施例中,该SANF网元生成安全配置文件之后,可以将该安全配置文件传递给UDM网元,这样,UDM网元可以将该安全配置文件作为新增的信息元素(Information Element)字段(即SP IE),并对新增的信息元素字段进行完整性保护处理,将完整性保护处理后的信息元素字段依次通过认证服务器功能(Authentication Server Function,简称为AUSF)网元和安全锚点功能(SEcurity Anchor Function,简称为SEAF)网元传递给用户终端,如图4所示。这样,用户终端可以根据SP IE的指示生成相关的安全配置文件及后续的密钥推演,并回复网络侧认证响应消息。In one embodiment, after the SANF network element generates a security configuration file, the security configuration file can be passed to the UDM network element. In this way, the UDM network element can use the security configuration file as a new information element (Information Element) field. (i.e. SP IE), perform integrity protection processing on the newly added information element fields, and pass the integrity-protected information element fields through the Authentication Server Function (AUSF) network element and security anchor in turn Function (SEcurity Anchor Function, SEAF for short) network element is delivered to the user terminal, as shown in Figure 4. In this way, the user terminal can generate relevant security configuration files and subsequent key derivation according to the instructions of the SP IE, and reply to the network side authentication response message.
在一示例性实施例中,UDM网元还用于根据安全配置文件生成归属环境认证向量,并将归属环境认证向量中的认证令牌与完整性保护处理后的信息元素字段依次通过AUSF网元和SEAF网元传递给用户终端;其中,AUSF网元用于根据归属环境认证向量确定服务环境认证向量,并将服务环境认证向量和完整性保护处理后的信息元素字段发送给SEAF网元;SEAF网元用于将服务环境认证向量和完整性保护处理后的信息元素字段发送给用户终端;服务环境认证向量中包括认证令牌;用户终端用于根据认证令牌进行时效性验证并对完整性保护处理后的信息元素字段进行完整性验证,在时效性验证成功且完整性验证成功的情况下,根据完整性验证成功的信息元素字段完成接入网络的安全认证流程。In an exemplary embodiment, the UDM network element is also configured to generate a home environment authentication vector according to the security configuration file, and pass the authentication token and the information element field after integrity protection processing in the home environment authentication vector through the AUSF network element in sequence. and SEAF network element to the user terminal; wherein, the AUSF network element is used to determine the service environment authentication vector based on the home environment authentication vector, and send the service environment authentication vector and the information element field after integrity protection processing to the SEAF network element; SEAF The network element is used to send the service environment authentication vector and the information element field after integrity protection processing to the user terminal; the service environment authentication vector includes the authentication token; the user terminal is used to perform timeliness verification based on the authentication token and verify the integrity The protected information element fields are subjected to integrity verification. If the timeliness verification and integrity verification are successful, the security authentication process of the access network is completed based on the information element fields with successful integrity verification.
参见图4,UDM网元还可以根据该安全配置文件生成归属环境认证向量(5G Home  Environment Authentication Vector,简称为5G HE AV),并将归属环境认证向量中的认证令牌((Authentication Token,简称为AUTN)与完整性保护处理后的信息元素字段作为认证响应消息(即图4中的Nudm_UEAuthentication_Get Response)传递给AUSF网元。AUSF网元可以根据归属环境认证向量确定服务环境认证向量(5G Service Environment Authentication Vector,简称为5G SE AV),并将服务环境认证向量中的认证令牌和完整性保护处理后的信息元素字段作为认证响应消息(即图4中的Nausf_UEAuthentication_Authenticate Response)发送给SEAF网元;SEAF网元可以将服务环境认证向量和完整性保护处理后的信息元素字段作为认证请求(即图4中的Authentication Request)发送给用户终端;最后用户终端可以根据认证令牌进行时效性验证并对完整性保护处理后的信息元素字段进行完整性验证。在一示例性实施例中,在网络侧使用用户终端相关的私钥对SP IE进行完整性保护,用户终端在收到网络侧的认证请求(即Authentication Request)后,通过认证请求中的AUTN来验证认证请求消息的时效性。在确认认证请求消息的时效性可被接受后,通过网络侧的公钥来验证SP IE的完整性,如果完整性验证失败,则向网络侧回复认证失败;如果完整性验证成功,则根据完整性验证成功的信息元素字段生成相关的安全配置文件及后续的密钥推演,并回复网络侧认证响应消息(即图4中的Authentication Response),以此完成接入网络的安全认证流程。通过这种方式,可以有效防止SP IE在传输过程被篡改,提高了安全配置文件传输的安全性。Referring to Figure 4, the UDM network element can also generate a home environment authentication vector (5G Home Environment Authentication Vector, referred to as 5G HE AV), and uses the authentication token (Authentication Token, referred to as AUTN) in the home environment authentication vector and the information element field after integrity protection processing as the authentication response message (i.e. in Figure 4 Nudm_UEAuthentication_Get Response) is passed to the AUSF network element. The AUSF network element can determine the service environment authentication vector (5G Service Environment Authentication Vector, referred to as 5G SE AV) based on the home environment authentication vector, and combine the authentication token in the service environment authentication vector with The information element field after integrity protection is sent to the SEAF network element as an authentication response message (i.e., Nausf_UEAuthentication_Authenticate Response in Figure 4); the SEAF network element can use the service environment authentication vector and the information element field after integrity protection as an authentication request. (i.e., the Authentication Request in Figure 4) is sent to the user terminal; finally, the user terminal can perform timeliness verification based on the authentication token and integrity verification of the information element field after integrity protection processing. In an exemplary embodiment, The network side uses the private key related to the user terminal to protect the integrity of the SP IE. After receiving the authentication request (ie, Authentication Request) from the network side, the user terminal verifies the timeliness of the authentication request message through the AUTN in the authentication request. After confirming that the timeliness of the authentication request message is acceptable, the integrity of the SP IE is verified through the public key of the network side. If the integrity verification fails, an authentication failure reply is sent to the network side; if the integrity verification is successful, the SP IE is Generate relevant security configuration files and subsequent key derivation for information element fields with successful sexual verification, and reply to the network side authentication response message (i.e. Authentication Response in Figure 4), thereby completing the security authentication process of the access network. Through this This method can effectively prevent SP IE from being tampered with during the transmission process and improve the security of secure configuration file transmission.
在一示例性实施例中,上述步骤101、在用户终端接入网络的情况下,获取用户终端和接入网络的安全信息,包括:在用户终端请求接入网络的情况下,接收UDM网元发送的安全信息,其中,UDM网元用于在接收到AUSF网元发送的第一认证请求的情况下,对第一认证请求进行解析得到第一认证请求中携带的安全信息,并将安全信息发送至SANF网元;其中,第一认证请求是AUSF网元在接收到SEAF网元发送的第二认证请求的情况下生成的,第二认证请求是SEAF网元在接收到用户终端发送的注册请求的情况下生成的,第二认证请求中携带有终端类型、用户订阅标识和接入网络的类型,注册请求是用户终端接入网络的情况下生成的,注册请求中携带有终端类型和用户订阅标识。In an exemplary embodiment, the above step 101, when the user terminal accesses the network, obtains the security information of the user terminal and the access network, including: when the user terminal requests to access the network, receiving the UDM network element The security information sent, wherein the UDM network element is used to parse the first authentication request sent by the AUSF network element to obtain the security information carried in the first authentication request, and transfer the security information Sent to the SANF network element; where the first authentication request is generated by the AUSF network element after receiving the second authentication request sent by the SEAF network element, and the second authentication request is generated by the SEAF network element after receiving the registration sent by the user terminal. The second authentication request carries the terminal type, user subscription identification and access network type. The registration request is generated when the user terminal accesses the network. The registration request carries the terminal type and user Subscription ID.
在一实施例中,当用户终端请求接入网络时,该SANF网元可以从UDM网元获取安全信息。在一示例性实施例中,如图5所示,用户终端UE在接入网络发起注册请求(即图5中的Register Request),在注册请求消息中携带终端类型UE type、SUCI或5G全球临时UE标识符(5G Globally Unique Temporary UE Identity,简称为5G-GUTI),注册请求发送到服务网络的安全锚点功能(SEAF,SEcurity Anchor Function)网元。SEAF网元通过发送第二认证请求 (即图5中Nausf_UEAuthentication_Authenticate Request消息)给AUSF网元调用Nausf_UEAuthentication服务,第二认证请求中携带SUCI或映射5G-GUTI的SUPI,服务网络名称(Serving Network Name,简称为SNN),其中,服务网络名称可以包含服务网络标识(即SN ID)和接入网类型(即access network type)。AUSF网元在收到第二认证消息后,通过对比在第二认证请求消息中携带的服务网络名称与预设的用户终端所在的服务网络的服务网络名称是否一致,以此来验证该服务网络的SEAF网元是否有权使用第二认证请求消息中的服务网络名称,同时验证对应的接入网络的类型。如果该服务网络没有授权使用第二认证请求消息中的服务网络名称,则回复“服务网未被授权”。否则,AUSF网元认为服务网络是被授权使用第二认证请求消息中的服务网名称的。此时,AUSF网元发起第一认证请求(即图5中的Nudm_UEAuthentication_Get Request消息)给UDM网元,该第一认证请求中携带SUCI或SUPI,以及服务网络名称。UDM网元在收到Nudm_UEAuthentication_Get Request消息后,将消息携带的安全信息发送给该SANF网元,该SANF网元生成安全配置文件(Security profile)。In an embodiment, when the user terminal requests to access the network, the SANF network element can obtain security information from the UDM network element. In an exemplary embodiment, as shown in Figure 5, the user terminal UE initiates a registration request (i.e. Register Request in Figure 5) on the access network, and the registration request message carries the terminal type UE type, SUCI or 5G global temporary UE identifier (5G Globally Unique Temporary UE Identity, referred to as 5G-GUTI), the registration request is sent to the security anchor function (SEAF, SEcurity Anchor Function) network element of the service network. The SEAF network element sends a second authentication request (i.e., the Nausf_UEAuthentication_Authenticate Request message in Figure 5) calls the Nausf_UEAuthentication service to the AUSF network element. The second authentication request carries SUCI or SUPI mapping 5G-GUTI, and the Serving Network Name (SNN for short), where the Serving Network Name It may include the service network identifier (ie SN ID) and the access network type (ie access network type). After receiving the second authentication message, the AUSF network element verifies the service network by comparing whether the service network name carried in the second authentication request message is consistent with the default service network name of the service network where the user terminal is located. Whether the SEAF network element has the right to use the service network name in the second authentication request message, and at the same time verify the type of the corresponding access network. If the service network is not authorized to use the service network name in the second authentication request message, then "the service network is not authorized" is replied. Otherwise, the AUSF network element considers that the service network is authorized to use the service network name in the second authentication request message. At this time, the AUSF network element initiates a first authentication request (ie, the Nudm_UEAuthentication_Get Request message in Figure 5) to the UDM network element. The first authentication request carries SUCI or SUPI, and the service network name. After receiving the Nudm_UEAuthentication_Get Request message, the UDM network element sends the security information carried in the message to the SANF network element, and the SANF network element generates a security profile (Security profile).
需要说明的是,图5是在现有5G安全认证流程作出的改进,例如,在现有流程中增加了SANF网元,且用户终端在接入网络发起注册请求时除了携带有SUCI或5G-GUTI外,还可以携带有UE type,SEAF网元在向AUSF网元发丝第二认证请求以及AUSF网元在向UDM网元发丝第一认证请求时,除了携带有SN ID、SUCI或SUPI外,还可以携带有access network type。It should be noted that Figure 5 is an improvement made in the existing 5G security authentication process. For example, a SANF network element is added to the existing process, and when the user terminal initiates a registration request on the access network, in addition to carrying SUCI or 5G- In addition to GUTI, it can also carry UE type. When the SEAF network element sends the second authentication request to the AUSF network element and the AUSF network element sends the first authentication request to the UDM network element, in addition to carrying the SN ID, SUCI or SUPI In addition, you can also carry access network type.
在一示例性实施例中,配置参数包括用于表征认证模式类型的参数、用于表征密钥推演算法的参数和用于表征密钥长度的参数。In an exemplary embodiment, the configuration parameters include parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, and parameters used to characterize the key length.
以下以mMTC密集化的接入场景为例进行说明,在该场景下,5G要求百万每平公里的接入量,6G则要求千万级每平方公里的接入量。如此密集化的终端接入,对网络的接入认证将造成不可忽视的冲击。对现有的5G统一认证架构流程是否能满足后续的移动网络的容量扩展存疑。引入SANF网元可以灵活配置用户的Security Profile,根据终端类型或和用户订阅数据,选择合适的认证模式和安全处理。The following takes the intensive access scenario of mMTC as an example. In this scenario, 5G requires an access volume of millions per square kilometer, while 6G requires an access volume of tens of millions per square kilometer. Such intensive terminal access will have a significant impact on network access authentication. There are doubts about whether the existing 5G unified certification architecture process can meet the subsequent capacity expansion of mobile networks. The introduction of SANF network elements can flexibly configure the user's Security Profile and select the appropriate authentication mode and security processing based on the terminal type or user subscription data.
在一示例性实施例中,UE在接入网络时,发起注册请求,携带终端类型,为mMTC中某类低能类终端。网络侧在收到UE的注册请求后,根据UE的终端类型和订阅数据信息,为UE选择可匹配的轻量化接入认证模式,简化的密钥推演算法,以及合适的密钥长度等安全配置Security profile;网络侧根据生成的Security profile,生成简化的5G HE AV,并将SP信息通过SP IE指示给UE;最后UE侧根据SP IE指示信息和网络侧的认证信息完成与网络侧的相互 安全认证流程。In an exemplary embodiment, when accessing the network, the UE initiates a registration request carrying the terminal type, which is a certain type of low-energy terminal in the mMTC. After receiving the registration request from the UE, the network side selects a matching lightweight access authentication mode, a simplified key derivation algorithm, and appropriate key length and other security configurations for the UE based on the UE's terminal type and subscription data information. Security profile; the network side generates a simplified 5G HE AV based on the generated Security profile, and indicates the SP information to the UE through the SP IE; finally, the UE side completes the interaction with the network side based on the SP IE indication information and the authentication information of the network side. Security certification process.
在本公开中,将UE和网络的安全能力协商统一处理,将UE自身的能力和订阅信息等综合考虑,根据UE的能力、UE的分类、用户订阅倾向,形成差异化的自动匹配。通过这种方式,具有如下技术效果。In this disclosure, the security capability negotiation between the UE and the network is processed in a unified manner, the UE's own capabilities and subscription information are comprehensively considered, and differentiated automatic matching is formed based on the UE's capabilities, UE classification, and user subscription tendencies. In this way, the following technical effects are achieved.
一、可以将认证模式扩展成多种认证模式,不仅仅包含现有的5G-AKA和EAP-AKA’,也可以将其他认证模式引入进来,如EAP-TLS,甚至是为适应不同的应用场景和不同的安全需求,可以引入轻量化的认证模式或重量化认证模式。1. The authentication mode can be expanded into multiple authentication modes, not only including the existing 5G-AKA and EAP-AKA', but also other authentication modes can be introduced, such as EAP-TLS, even to adapt to different application scenarios. Based on different security requirements, lightweight authentication mode or heavy authentication mode can be introduced.
二、可以支持灵活扩展密钥推演算法。当前的密钥推演算法是固化的,通过扩展密钥推演算法,可以将国密算法SM3和SM4引入到密钥推演算法中。甚至为满足行业专网的专用需求,可以引入企业或运营商要求或指定的密钥推演算法。2. It can support flexible expansion of key derivation algorithms. The current key derivation algorithm is solidified. By extending the key derivation algorithm, the national secret algorithms SM3 and SM4 can be introduced into the key derivation algorithm. Even to meet the special needs of industry private networks, key derivation algorithms required or specified by enterprises or operators can be introduced.
三、易于密钥长度的向上扩展。当前5G认证与密钥协商所使用的密钥长度是128bits,密钥长度是直接体现安全能力的参数之一。这种固定密钥长度的加密算法无法体现安全需求的差异性。对于高安全要求的场景,如防量子化攻击的应用,128bits不再能满足安全的要求,那么就需要支持更长的密钥长度。可扩展的密钥长度并不是随意指定密钥长度,而是支持多种密钥长度(如支持128bits,256bits等),根据场景和安全需求,可以进行选择密钥长度来满足当前的需求。3. Easy to expand the key length upwards. The current key length used in 5G authentication and key negotiation is 128 bits, and the key length is one of the parameters that directly reflects security capabilities. This encryption algorithm with a fixed key length cannot reflect the differences in security requirements. For scenarios with high security requirements, such as applications that prevent quantum attacks, 128 bits can no longer meet the security requirements, so longer key lengths need to be supported. The scalable key length does not mean arbitrarily specifying the key length, but supports multiple key lengths (such as supporting 128bits, 256bits, etc.). According to the scenario and security requirements, the key length can be selected to meet current needs.
四、灵活支持其他安全能力的扩展。安全能力扩展包括但不限于上述描述的三种参数,可以根据后续需求进行灵活扩展。对于这种安全能力的灵活扩展和多层级安全能力的支持,非常有必要引入一个仲裁协商的功能,来根据安全的需求进行安全能力的匹配和协商,提供最优的安全组合给不同的应用场景。引入全算法协商功能(SANF)可以根据用户的订阅机制,也可以根据终端类型或接入网类型,对上述所描述的参数进行自动匹配。4. Flexibly support the expansion of other security capabilities. Security capability expansion includes but is not limited to the three parameters described above, and can be flexibly expanded according to subsequent needs. For the flexible expansion of this security capability and the support of multi-level security capabilities, it is very necessary to introduce an arbitration negotiation function to match and negotiate security capabilities according to security requirements, and provide optimal security combinations for different application scenarios. . The introduction of the Full Algorithm Negotiation Function (SANF) can automatically match the parameters described above according to the user's subscription mechanism, terminal type or access network type.
本公开相较于现有技术并非简单技术的组合,而是运用大数据的概念在收集用户的安全能力、订阅信息等数据,通过综合的分析和判决算法能为不同终端和不同用户倾向提供差异化的安全匹配。Compared with the existing technology, this disclosure is not a combination of simple technologies, but uses the concept of big data to collect data such as users' security capabilities and subscription information. Through comprehensive analysis and decision algorithms, it can provide differences for different terminals and different user tendencies. Safe matching.
参见图6,图6为本公开提供的一种用户终端接入网络的安全认证装置,应用于安全算法协商功能SANF网元,该装置600包括:获取模块601、确定模块602、传递模块603。Referring to Figure 6, Figure 6 shows a security authentication device for user terminal access to the network provided by the present disclosure, which is applied to the security algorithm negotiation function SANF network element. The device 600 includes: an acquisition module 601, a determination module 602, and a transfer module 603.
获取模块601,配置为获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型;确定模块602,配置为根据终端类 型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数;传递模块603,配置为根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。The acquisition module 601 is configured to obtain the security information of the user terminal and the access network. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of access network; the determination module 602 is configured to obtain the security information according to the terminal type. type, user subscription identification and access network type to determine the configuration parameters used to generate a security configuration file; the delivery module 603 is configured to generate a security configuration file based on the configuration parameters and deliver the security configuration file to the user terminal for use by the user. The terminal completes the security authentication process for accessing the network based on the security configuration file.
在一示例性实施例中,确定模块602包括:第一接收子模块,配置为接收统一数据管理UDM网元发送的用户订阅消息以及用户终端和接入网络所支持的认证模式类型,其中,用户订阅消息是UDM网元基于用户订阅标识获取得到,用户终端和接入网络所支持的认证模式类型是UDM网元基于用户订阅标识从认证凭证仓储ARPF网元获取得到;确定子模块,配置为根据用户订阅消息、用户终端和接入网络所支持的认证模式类型,以及获取到的终端类型和接入网络的类型,确定用于生成安全配置文件的配置参数。In an exemplary embodiment, the determining module 602 includes: a first receiving sub-module configured to receive a user subscription message sent by the unified data management UDM network element and the authentication mode type supported by the user terminal and the access network, wherein the user The subscription message is obtained by the UDM network element based on the user subscription identifier. The authentication mode type supported by the user terminal and access network is obtained by the UDM network element from the authentication certificate storage ARPF network element based on the user subscription identifier; the determination sub-module is configured to be based on The user subscription message, the authentication mode type supported by the user terminal and the access network, and the acquired terminal type and access network type determine the configuration parameters used to generate the security configuration file.
在一示例性实施例中,在用户订阅标识为用户隐藏订阅标识符类型的情况下,UDM网元需要通过订阅标识符解密功能SIDF网元对用户订阅标识进行解密,并基于解密后的用户订阅标识获取用户订阅消息、用户凭证以及用户终端和接入网络所支持的认证模式类型,其中,SIDF网元是基于用户凭证对用户订阅标识进行解密,用户凭证是UDM网元基于用户订阅标识从ARPF网元获取得到;在用户订阅标识为用户永久订阅标识符的情况下,UDM网元直接基于用户订阅标识获取用户订阅消息、用户凭证以及用户终端和接入网络所支持的认证模式类型。In an exemplary embodiment, when the user subscription identifier is a user-hidden subscription identifier type, the UDM network element needs to decrypt the user subscription identifier through the subscription identifier decryption function SIDF network element, and based on the decrypted user subscription The identification obtains user subscription messages, user credentials, and authentication mode types supported by user terminals and access networks. The SIDF network element decrypts the user subscription identity based on the user credentials. The user credentials are obtained by the UDM network element from ARPF based on the user subscription identity. Obtained by the network element; when the user subscription identifier is the user permanent subscription identifier, the UDM network element directly obtains the user subscription message, user credentials, and the authentication mode type supported by the user terminal and access network based on the user subscription identifier.
在一示例性实施例中,传递模块603包括:传递子模块,配置为将安全配置文件传递给UDM网元,其中,UDM网元用于将安全配置文件作为新增的信息元素字段,并对新增的信息元素字段进行完整性保护处理,将完整性保护处理后的信息元素字段依次通过认证服务器功能AUSF网元和安全锚点功能SEAF网元传递给用户终端。In an exemplary embodiment, the transfer module 603 includes: a transfer sub-module configured to transfer the security configuration file to the UDM network element, where the UDM network element is used to use the security configuration file as a new information element field, and The newly added information element fields are processed for integrity protection, and the information element fields after integrity protection are sequentially delivered to the user terminal through the authentication server function AUSF network element and the security anchor function SEAF network element.
在一示例性实施例中,UDM网元还用于根据安全配置文件生成归属环境认证向量,并将归属环境认证向量中的认证令牌与完整性保护处理后的信息元素字段依次通过AUSF网元和SEAF网元传递给用户终端;其中,AUSF网元用于根据归属环境认证向量确定服务环境认证向量,并将服务环境认证向量和完整性保护处理后的信息元素字段发送给SEAF网元;SEAF网元用于将服务环境认证向量和完整性保护处理后的信息元素字段发送给用户终端;服务环境认证向量中包括认证令牌;用户终端用于根据认证令牌进行时效性验证并对完整性保护处理后的信息元素字段进行完整性验证,在时效性验证成功且完整性验证成功的情况下,根据完整性验证成功的信息元素字段完成接入网络的安全认证流程。 In an exemplary embodiment, the UDM network element is also configured to generate a home environment authentication vector according to the security configuration file, and pass the authentication token and the information element field after integrity protection processing in the home environment authentication vector through the AUSF network element in sequence. and SEAF network element to the user terminal; wherein, the AUSF network element is used to determine the service environment authentication vector based on the home environment authentication vector, and send the service environment authentication vector and the information element field after integrity protection processing to the SEAF network element; SEAF The network element is used to send the service environment authentication vector and the information element field after integrity protection processing to the user terminal; the service environment authentication vector includes the authentication token; the user terminal is used to perform timeliness verification based on the authentication token and verify the integrity The protected information element fields are subjected to integrity verification. If the timeliness verification and integrity verification are successful, the security authentication process of the access network is completed based on the information element fields with successful integrity verification.
在一示例性实施例中,获取模块601包括:第二接收子模块,配置为在用户终端请求接入网络的情况下,接收UDM网元发送的安全信息,其中,UDM网元用于在接收到AUSF网元发送的第一认证请求的情况下,对第一认证请求进行解析得到第一认证请求中携带的安全信息,并将安全信息发送至SANF网元;其中,第一认证请求是AUSF网元在接收到SEAF网元发送的第二认证请求的情况下生成的,第二认证请求是SEAF网元在接收到用户终端发送的注册请求的情况下生成的,第二认证请求中携带有终端类型、用户订阅标识和接入网络的类型,注册请求是用户终端接入网络的情况下生成的,注册请求中携带有终端类型和用户订阅标识。In an exemplary embodiment, the acquisition module 601 includes: a second receiving submodule configured to receive the security information sent by the UDM network element when the user terminal requests to access the network, wherein the UDM network element is used to receive In the case of the first authentication request sent by the AUSF network element, the first authentication request is parsed to obtain the security information carried in the first authentication request, and the security information is sent to the SANF network element; where the first authentication request is AUSF The network element generates the second authentication request when it receives the second authentication request sent by the SEAF network element. The second authentication request is generated by the SEAF network element when it receives the registration request sent by the user terminal. The second authentication request carries Terminal type, user subscription identification and access network type. The registration request is generated when the user terminal accesses the network. The registration request carries the terminal type and user subscription identification.
在一示例性实施例中,配置参数包括用于表征认证模式类型的参数、用于表征密钥推演算法的参数和用于表征密钥长度的参数。In an exemplary embodiment, the configuration parameters include parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, and parameters used to characterize the key length.
需要说明的是,该用户终端接入网络的安全认证装置600可以实现如前述任意一个方法实施例提供的用户终端接入网络的安全认证方法的步骤,且能达到相同的技术效果,在此不再一一赘述。It should be noted that the security authentication device 600 for user terminal access to the network can implement the steps of the security authentication method for user terminal access to the network as provided in any of the foregoing method embodiments, and can achieve the same technical effect, which will not be discussed here. Let’s go over them one by one.
如图7所示,本公开提供了一种电子设备,包括处理器711、通信接口712、存储器713和通信总线714,其中,处理器711,通信接口712,存储器713通过通信总线714完成相互间的通信,存储器713,用于存放计算机程序;在本公开一个实施例中,处理器711,用于执行存储器713上所存放的程序时,实现前述任意一个方法实施例提供的用户终端接入网络的安全认证方法,包括:在用户终端接入网络的情况下,获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型;根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数;根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。As shown in Figure 7, the present disclosure provides an electronic device, including a processor 711, a communication interface 712, a memory 713, and a communication bus 714. The processor 711, the communication interface 712, and the memory 713 complete interactions with each other through the communication bus 714. communication, the memory 713 is used to store computer programs; in one embodiment of the present disclosure, the processor 711 is used to implement the user terminal access network provided by any of the foregoing method embodiments when executing the program stored on the memory 713 The security authentication method includes: when the user terminal accesses the network, obtaining security information of the user terminal and the access network. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of the access network; Determine the configuration parameters used to generate a security configuration file based on the terminal type, user subscription identification and access network type; generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal for the user terminal to configure according to the security configuration The file completes the security authentication process for accessing the network.
本公开还提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现如前述任意一个方法实施例提供的用户终端接入网络的安全认证方法的步骤。The present disclosure also provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the steps of the security authentication method for user terminal access to the network as provided in any of the foregoing method embodiments are implemented.
在本公开中,通过在用户终端接入网络的情况下,获取用户终端和接入网络的安全信息,安全信息包括用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型;根据终端类型、用户订阅标识和接入网络的类型,确定用于生成安全配置文件的配置参数; 根据配置参数生成安全配置文件,并将安全配置文件传递给用户终端,以供用户终端根据安全配置文件完成接入网络的安全认证流程。通过这种方式,可以在网络侧新增安全算法协商功能SANF网元,由SANF网元根据用户终端的终端类型、用户终端的用户订阅标识和接入网络的类型,生成符合该用户终端和该接入网络能力和安全需求的安全配置文件,并将该安全配置文件传递给该用户终端,使得用户终端根据该安全配置文件完成接入网络的安全认证流程。这样,可以针对不同业务场景下的不同终端类型、不同接入网络类型,以及不同用户订阅标识,生成差异化的安全配置文件,实现差异化的安全认证。这样,可以利用新增的SANF网元,根据不同业务场景下的不同终端类型、不同接入网络类型以及不同用户订阅标识,生成差异化的安全配置文件,从而实现差异化的安全认证。In this disclosure, when the user terminal accesses the network, the security information of the user terminal and the access network is obtained. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the type of access network; according to The terminal type, user subscription ID and access network type determine the configuration parameters used to generate security configuration files; Generate a security configuration file based on the configuration parameters, and pass the security configuration file to the user terminal, so that the user terminal can complete the security authentication process for accessing the network based on the security configuration file. In this way, the security algorithm negotiation function SANF network element can be added to the network side. The SANF network element generates a network element that matches the user terminal and the type of the access network based on the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of access network. Access network capabilities and security requirements security configuration file, and pass the security configuration file to the user terminal, so that the user terminal completes the security authentication process of accessing the network based on the security configuration file. In this way, differentiated security configuration files can be generated for different terminal types, different access network types, and different user subscription IDs in different business scenarios to achieve differentiated security authentication. In this way, the newly added SANF network elements can be used to generate differentiated security configuration files based on different terminal types, different access network types, and different user subscription IDs in different business scenarios, thereby achieving differentiated security authentication.
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that in this article, relational terms such as “first” and “second” are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply these Any such actual relationship or sequence exists between entities or operations. Furthermore, the terms "comprises," "comprises," or any other variation thereof are intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus that includes a list of elements includes not only those elements, but also those not expressly listed other elements, or elements inherent to the process, method, article or equipment. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article, or apparatus that includes the stated element.
以上所述仅是本公开的具体实施方式,使本领域技术人员能够理解或实现本公开。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所申请的原理和新颖特点相一致的最宽的范围。 The above descriptions are only specific embodiments of the present disclosure, enabling those skilled in the art to understand or implement the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be practiced in other embodiments without departing from the spirit or scope of the disclosure. Therefore, the present disclosure is not to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features claimed herein.

Claims (10)

  1. 一种用户终端接入网络的安全认证方法,应用于安全算法协商功能SANF网元,所述方法包括:A security authentication method for user terminal access to the network, applied to the security algorithm negotiation function SANF network element, the method includes:
    在用户终端接入网络的情况下,获取所述用户终端和接入网络的安全信息,所述安全信息包括所述用户终端的终端类型、所述用户终端的用户订阅标识和所述接入网络的类型;When the user terminal accesses the network, the security information of the user terminal and the access network is obtained. The security information includes the terminal type of the user terminal, the user subscription identification of the user terminal and the access network. type;
    根据所述终端类型、所述用户订阅标识和所述接入网络的类型,确定用于生成安全配置文件的配置参数;Determine configuration parameters for generating a security configuration file according to the terminal type, the user subscription identification and the type of access network;
    根据所述配置参数生成所述安全配置文件,并将所述安全配置文件传递给所述用户终端,以供所述用户终端根据所述安全配置文件完成接入网络的安全认证流程。The security configuration file is generated according to the configuration parameters, and the security configuration file is delivered to the user terminal, so that the user terminal completes the security authentication process of accessing the network according to the security configuration file.
  2. 根据权利要求1所述的方法,其中,所述根据所述终端类型、所述用户订阅标识和所述接入网络的类型,确定用于生成安全配置文件的配置参数,包括:The method according to claim 1, wherein determining configuration parameters for generating a security configuration file based on the terminal type, the user subscription identification and the type of access network includes:
    接收统一数据管理UDM网元发送的用户订阅消息以及所述用户终端和所述接入网络所支持的认证模式类型,其中,所述用户订阅消息是所述UDM网元基于所述用户订阅标识获取得到,所述用户终端和所述接入网络所支持的认证模式类型是所述UDM网元基于所述用户订阅标识从认证凭证仓储ARPF网元获取得到;Receive a user subscription message sent by a unified data management UDM network element and an authentication mode type supported by the user terminal and the access network, wherein the user subscription message is obtained by the UDM network element based on the user subscription identification It is obtained that the authentication mode type supported by the user terminal and the access network is obtained by the UDM network element from the authentication certificate storage ARPF network element based on the user subscription identifier;
    根据所述用户订阅消息、所述用户终端和所述接入网络所支持的认证模式类型,以及获取到的所述终端类型和所述接入网络的类型,确定用于生成安全配置文件的配置参数。Determine the configuration for generating a security configuration file according to the user subscription message, the authentication mode type supported by the user terminal and the access network, and the acquired terminal type and access network type. parameter.
  3. 根据权利要求2所述的方法,其中,在所述用户订阅标识为用户隐藏订阅标识符类型的情况下,所述UDM网元需要通过订阅标识符解密功能SIDF网元对所述用户订阅标识进行解密,并基于解密后的用户订阅标识获取所述用户订阅消息、所述用户凭证以及所述用户终端和所述接入网络所支持的认证模式类型,其中,所述SIDF网元是基于用户凭证对所述用户订阅标识进行解密,所述用户凭证是所述UDM网元基于所述用户订阅标识从所述ARPF网元获取得到;The method according to claim 2, wherein when the user subscription identification is a user-hidden subscription identifier type, the UDM network element needs to use the subscription identifier decryption function SIDF network element to perform decryption of the user subscription identification. Decrypt, and obtain the user subscription message, the user credentials, and the authentication mode type supported by the user terminal and the access network based on the decrypted user subscription identification, wherein the SIDF network element is based on the user credentials Decrypt the user subscription identification, and the user credential is obtained by the UDM network element from the ARPF network element based on the user subscription identification;
    在所述用户订阅标识为用户永久订阅标识符的情况下,所述UDM网元直接基于所述用户订阅标识获取所述用户订阅消息、所述用户凭证以及所述用户终端和所述接入网络所支持的认证模式类型。When the user subscription identifier is a user permanent subscription identifier, the UDM network element directly obtains the user subscription message, the user credential, the user terminal and the access network based on the user subscription identifier. Supported authentication mode types.
  4. 根据权利要求2所述的方法,其中,所述将所述安全配置文件传递给所述用户终端, 包括:The method of claim 2, wherein said transmitting the security configuration file to the user terminal, include:
    将所述安全配置文件传递给所述UDM网元,其中,所述UDM网元用于将所述安全配置文件作为新增的信息元素字段,并对所述新增的信息元素字段进行完整性保护处理,将完整性保护处理后的信息元素字段依次通过认证服务器功能AUSF网元和安全锚点功能SEAF网元传递给所述用户终端。Pass the security configuration file to the UDM network element, where the UDM network element is used to use the security configuration file as a new information element field, and perform integrity check on the new information element field. Protection processing: transmit the information element fields after integrity protection processing to the user terminal through the authentication server function AUSF network element and the security anchor point function SEAF network element in sequence.
  5. 根据权利要求4所述的方法,其中,所述UDM网元还用于根据所述安全配置文件生成归属环境认证向量,并将所述归属环境认证向量中的认证令牌与所述完整性保护处理后的信息元素字段依次通过所述AUSF网元和所述SEAF网元传递给所述用户终端;The method according to claim 4, wherein the UDM network element is further configured to generate a home environment authentication vector according to the security configuration file, and combine the authentication token in the home environment authentication vector with the integrity protection The processed information element fields are delivered to the user terminal through the AUSF network element and the SEAF network element in sequence;
    其中,所述AUSF网元用于根据所述归属环境认证向量确定服务环境认证向量,并将所述服务环境认证向量和所述完整性保护处理后的信息元素字段发送给所述SEAF网元;所述SEAF网元用于将所述服务环境认证向量和所述完整性保护处理后的信息元素字段发送给所述用户终端;所述服务环境认证向量中包括所述认证令牌;所述用户终端用于根据所述认证令牌进行时效性验证并对所述完整性保护处理后的信息元素字段进行完整性验证,在所述时效性验证成功且所述完整性验证成功的情况下,根据完整性验证成功的信息元素字段完成接入网络的安全认证流程。Wherein, the AUSF network element is configured to determine a service environment authentication vector according to the home environment authentication vector, and send the service environment authentication vector and the information element field after integrity protection processing to the SEAF network element; The SEAF network element is configured to send the service environment authentication vector and the information element field after integrity protection processing to the user terminal; the service environment authentication vector includes the authentication token; the user The terminal is configured to perform timeliness verification according to the authentication token and integrity verification of the information element field after the integrity protection process. When the timeliness verification is successful and the integrity verification is successful, according to The information element fields whose integrity verification is successful complete the security authentication process of the access network.
  6. 根据权利要求4所述的方法,其中,所述在用户终端接入网络的情况下,获取所述用户终端和接入网络的安全信息,包括:The method according to claim 4, wherein when the user terminal accesses the network, obtaining the security information of the user terminal and the access network includes:
    在所述用户终端请求接入网络的情况下,接收所述UDM网元发送的所述安全信息,其中,所述UDM网元用于在接收到所述AUSF网元发送的第一认证请求的情况下,对所述第一认证请求进行解析得到所述第一认证请求中携带的所述安全信息,并将所述安全信息发送至所述SANF网元;其中,所述第一认证请求是所述AUSF网元在接收到所述SEAF网元发送的第二认证请求的情况下生成的,所述第二认证请求是所述SEAF网元在接收到所述用户终端发送的注册请求的情况下生成的,所述第二认证请求中携带有所述终端类型、所述用户订阅标识和所述接入网络的类型,所述注册请求是所述用户终端接入网络的情况下生成的,所述注册请求中携带有所述终端类型和所述用户订阅标识。When the user terminal requests to access the network, receive the security information sent by the UDM network element, wherein the UDM network element is configured to receive the first authentication request sent by the AUSF network element. In this case, the first authentication request is parsed to obtain the security information carried in the first authentication request, and the security information is sent to the SANF network element; wherein the first authentication request is The AUSF network element generates the second authentication request when the SEAF network element receives the second authentication request sent by the SEAF network element. The second authentication request is generated when the SEAF network element receives the registration request sent by the user terminal. generated under the condition that the second authentication request carries the terminal type, the user subscription identification and the type of the access network, and the registration request is generated when the user terminal accesses the network, The registration request carries the terminal type and the user subscription identification.
  7. 根据权利要求1所述的方法,其中,所述配置参数包括用于表征认证模式类型的参数、用于表征密钥推演算法的参数和用于表征密钥长度的参数。The method according to claim 1, wherein the configuration parameters include parameters used to characterize the authentication mode type, parameters used to characterize the key derivation algorithm, and parameters used to characterize the key length.
  8. 一种用户终端接入网络的安全认证装置,应用于安全算法协商功能SANF网元,所述 装置包括:A security authentication device for user terminal access to the network, applied to the security algorithm negotiation function SANF network element, the Devices include:
    获取模块,配置为获取用户终端和接入网络的安全信息,所述安全信息包括所述用户终端的终端类型、所述用户终端的用户订阅标识和所述接入网络的类型;An acquisition module configured to acquire security information of the user terminal and the access network, where the security information includes the terminal type of the user terminal, the user subscription identification of the user terminal, and the type of the access network;
    确定模块,配置为根据所述终端类型、所述用户订阅标识和所述接入网络的类型,确定用于生成安全配置文件的配置参数;a determination module configured to determine configuration parameters for generating a security configuration file according to the terminal type, the user subscription identification, and the type of access network;
    传递模块,配置为根据所述配置参数生成所述安全配置文件,并将所述安全配置文件传递给所述用户终端,以供所述用户终端根据所述安全配置文件完成接入网络的安全认证流程。A delivery module configured to generate the security configuration file according to the configuration parameters, and deliver the security configuration file to the user terminal, so that the user terminal completes security authentication for accessing the network based on the security configuration file. process.
  9. 一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;An electronic device includes a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus;
    存储器,用于存放计算机程序;Memory, used to store computer programs;
    处理器,用于执行存储器上所存放的程序时,实现权利要求1-7任一项所述的用户终端接入网络的安全认证方法的步骤。The processor is configured to implement the steps of the security authentication method for user terminal access to the network described in any one of claims 1 to 7 when executing a program stored in the memory.
  10. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-7任一项所述的用户终端接入网络的安全认证方法的步骤。 A computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the steps of the security authentication method for a user terminal accessing a network according to any one of claims 1 to 7 are implemented.
PCT/CN2023/077193 2022-07-29 2023-02-20 Security authentication method for user terminal to access network, apparatus, and electronic device WO2024021580A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210909822.6 2022-07-29
CN202210909822.6A CN117527280A (en) 2022-07-29 2022-07-29 Security authentication method and device for user terminal to access network and electronic equipment

Publications (1)

Publication Number Publication Date
WO2024021580A1 true WO2024021580A1 (en) 2024-02-01

Family

ID=89705210

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/077193 WO2024021580A1 (en) 2022-07-29 2023-02-20 Security authentication method for user terminal to access network, apparatus, and electronic device

Country Status (2)

Country Link
CN (1) CN117527280A (en)
WO (1) WO2024021580A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474927A (en) * 2017-09-08 2019-03-15 中国电信股份有限公司 Information interacting method, home network, user terminal and information interaction system
CN110493774A (en) * 2017-05-06 2019-11-22 华为技术有限公司 Cipher key configuration method, apparatus and system
CN111787532A (en) * 2020-06-30 2020-10-16 兴唐通信科技有限公司 Method for negotiating 5G mobile communication network safety capability
US20220116777A1 (en) * 2019-01-18 2022-04-14 Thales Dis France Sa A Method for Authentication a Secure Element Cooperating with a Mobile Equipment within a Terminal in a Telecommunication Network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493774A (en) * 2017-05-06 2019-11-22 华为技术有限公司 Cipher key configuration method, apparatus and system
CN109474927A (en) * 2017-09-08 2019-03-15 中国电信股份有限公司 Information interacting method, home network, user terminal and information interaction system
US20220116777A1 (en) * 2019-01-18 2022-04-14 Thales Dis France Sa A Method for Authentication a Secure Element Cooperating with a Mobile Equipment within a Terminal in a Telecommunication Network
CN111787532A (en) * 2020-06-30 2020-10-16 兴唐通信科技有限公司 Method for negotiating 5G mobile communication network safety capability

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "A solution for KDF negotiation", 3GPP DRAFT; S3-170125_A SOLUTION FOR KDF NEGOTIATION_V5, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. Sophia Antipolis (France); 20170206 - 20170210, 2 February 2017 (2017-02-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051217491 *

Also Published As

Publication number Publication date
CN117527280A (en) 2024-02-06

Similar Documents

Publication Publication Date Title
US11825303B2 (en) Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus
WO2017190616A1 (en) Wireless network connection method, wireless access point, server, and system
US10638321B2 (en) Wireless network connection method and apparatus, and storage medium
US8275355B2 (en) Method for roaming user to establish security association with visited network application server
US10855668B2 (en) Wireless device authentication and service access
JP5144679B2 (en) User access management in communication networks
WO2017028593A1 (en) Method for making a network access device access a wireless network access point, network access device, application server, and non-volatile computer readable storage medium
US8635444B2 (en) System and method for distributing keys in a wireless network
JP3869392B2 (en) User authentication method in public wireless LAN service system and recording medium storing program for causing computer to execute the method
TWI388180B (en) Key generation in a communication system
US7231521B2 (en) Scheme for authentication and dynamic key exchange
WO2022127434A1 (en) Wireless local area network authentication method and apparatus, and electronic device and storage medium
US8417951B2 (en) Roaming authentication method based on WAPI
WO2022057736A1 (en) Authorization method and device
WO2023280194A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
TW201644292A (en) Apparatus and method for sponsored connectivity to wireless networks using application-specific network access credentials (2)
WO2018010150A1 (en) Authentication method and authentication system
CN109561431B (en) WLAN access control system and method based on multi-password identity authentication
US20220053334A1 (en) Using a network requirements field to provide a station access to a network
WO2021249512A1 (en) Secure communication method, related apparatus, and system
WO2007147354A1 (en) Method and system for retrieving service key
WO2018076298A1 (en) Security capability negotiation method and related device
US20090136043A1 (en) Method and apparatus for performing key management and key distribution in wireless networks
US20220264668A1 (en) Method and mechanism to assign a unique identifier to a station from an access point
WO2024021580A1 (en) Security authentication method for user terminal to access network, apparatus, and electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23844799

Country of ref document: EP

Kind code of ref document: A1