CN109151816A - A kind of network authentication method and system - Google Patents

A kind of network authentication method and system Download PDF

Info

Publication number
CN109151816A
CN109151816A CN201710510229.3A CN201710510229A CN109151816A CN 109151816 A CN109151816 A CN 109151816A CN 201710510229 A CN201710510229 A CN 201710510229A CN 109151816 A CN109151816 A CN 109151816A
Authority
CN
China
Prior art keywords
network
lte
mme
random number
encrypted result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710510229.3A
Other languages
Chinese (zh)
Other versions
CN109151816B (en
Inventor
李�赫
诸华林
靳维生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710510229.3A priority Critical patent/CN109151816B/en
Priority to PCT/CN2018/093319 priority patent/WO2019001509A1/en
Publication of CN109151816A publication Critical patent/CN109151816A/en
Application granted granted Critical
Publication of CN109151816B publication Critical patent/CN109151816B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of network authentication method and system, belong to field of communication technology.This method comprises: adding the network identity of LTE-U network in the first attach request when the MME of LTE-U network receives the first attach request, to generate the second attach request, and being sent to the MME of LTE network;The MME of LTE network is based on the second attach request, and the authorization data request of the network identity of the network identity and LTE network that carry LTE-U network is sent to HSS;HSS is requested based on authorization data, generates authentication vector, and be sent to the MME of LTE network;The MME of LTE network is interacted based on authentication vector and the MME of UE and LTE-U network, to realize network authentication.It that is to say, by method provided by the present application, UE can be in access carrier network and LTE-U network, disposable completion and the authentication between carrier network and LTE-U network.

Description

A kind of network authentication method and system
Technical field
This application involves field of communication technology, in particular to a kind of network authentication method and system.
Background technique
Unlicensed (Long Term Evolution-Unlicensed, LTE-U) network based on long term evolution, which refers to, to be removed Operator, user's deployment the network equipment except, the network that is made of the network equipment of third-party deployment.For example, certain hospital In the hospital area, the base station LTE-U (Evolved Node B, eNB), LTE-U mobile management entity (Mobility are deployed Management Entity, MME), the network equipments such as LTE-U gateway (Gateway, GW), these network equipments constitute LTE-U network, the user equipment (User Equipment, UE) in the hospital area can be by accessing the LTE-U net Network is communicated.In order to guarantee that UE can also use carrier network such as long term evolution (Long while accessing LTE-U network Term Evolution, LTE) network provide network service, the network equipment of LTE-U network can be with the net of carrier network Network equipment is attached, in this way, UE needs and the LTE-U when the currently UE access LTE-U network of non-access carrier network Network and carrier network are authenticated.
In the related technology, when UE accesses LTE network for the first time, UE carries out two-way recognizing first between the MME of LTE network Card, if UE determines that LTE network is true, and MME also determines that UE is true, then, two-way authentication success.Recognize when two-way After demonstrate,proving successfully, MME can generate Non-Access Stratum (Non-Access Stratum, NAS) key, and according to the NAS key, with UE into Row negotiating algorithm.When between MME and UE negotiating algorithm success after, LTE network base station (Evolved Node B, ENodeB access layer (Access Stratum, AS) key) can be generated, and according to progress algorithm association between the AS key and UE Quotient, if the negotiating algorithm success between eNodeB and UE, the authentication between UE and LTE network are completed, UE can successfully be connect Enter the LTE network.
Seen from the above description, when providing only UE access carrier network in the related technology with the net in carrier network The method that network equipment directly authenticates is not provided with when there are LTE-U network, UE access carrier network and LTE-U network The method of Shi Jinhang network authentication.
Summary of the invention
In order to solve the method for not providing UE access LTE network and LTE-U network progress network authentication in the related technology Problem, this application provides a kind of network authentication methods, and the technical solution is as follows:
In a first aspect, providing a kind of network authentication method, which comprises
When the mobile management entity MME of the unlicensed LTE-U network based on long term evolution is received from user equipment (UE) The first attach request when, the network identity of the LTE-U network is added in first attach request, it is second attached to generate Request, and second attach request is sent to the MME of long term evolution LTE network;
When the MME of the LTE network receives second attach request, it is based on second attach request, to returning Belong to assigned user server HSS and send authorization data request, the network of the LTE-U network is carried in the authorization data request The network identity of mark and the LTE network;
When the HSS receives authorization data request, network identity based on the LTE-U network and described The network identity of LTE network generates authentication vector, and sends the authentication vector, the authentication to the MME of the LTE network Vector includes the parameter for being authenticated to the UE, the LTE-U network and the LTE network;
When the MME of the LTE network receives the authentication vector, based on the authentication vector and the UE and institute The MME for stating LTE-U network is interacted, to realize network authentication.
Optionally, the authentication vector includes first foundation key, expectation return information, the first random number and authentication signature AUTN, the first foundation key are the corresponding key of the LTE-U network;
It is described to be interacted based on the authentication vector and the MME of the UE and the LTE-U network, to realize network Authentication, comprising:
The MME of the LTE network stores the expectation return information, and by the MME of the LTE-U network to described UE sends first random number, the AUTN, the network identity of the LTE-U network and the first encrypted result, and described first Encrypted result is generated by the MME of the LTE-U network based on the first foundation key;
When the UE receives first random number, the AUTN, the network identity of the LTE-U network and described When one encrypted result, the LTE network is verified based on first random number and the AUTN, and is based on described first Random number, the AUTN, the network identity of the LTE-U network and first encrypted result carry out the LTE-U network Verifying;
When the UE, which is determined, to be verified to the LTE network and the LTE-U network, return information is generated, and Network identity based on first random number, the AUTN and the LTE-U network generates the second encrypted result;
Second encrypted result is sent to the MME of the LTE-U network by the UE, and the return information is sent To the MME of LTE network;
When the MME of the LTE-U network receives second encrypted result, based on second encrypted result to institute It states UE to be verified, when the MME of the LTE network receives the return information, is based on the expectation return information and institute Return information is stated to verify the UE.
Optionally, the MME of the LTE network sends described first at random to the UE by the MME of the LTE-U network Several, the described AUTN and the first encrypted result, comprising:
The MME of the LTE network stores the expectation return information, and by the first foundation key, described First random number and the AUTN are sent to the MME of the LTE-U network;
When the MME of the LTE-U network receives the first foundation key, first random number and the AUTN When, the first foundation key is stored, the first encrypted result is generated based on the first foundation key, and by described the One random number, the AUTN, the network identity of the LTE-U network and first encrypted result are sent to the UE.
It is optionally, described that first encrypted result is generated based on the first foundation key, comprising:
The MME of the LTE-U network generates the second random number, and random by described in the first foundation key pair second Number is encrypted, and first encrypted result is obtained;
Correspondingly, described by first random number, the AUTN, the network identity of the LTE-U network and described One encrypted result is sent to the UE, comprising:
The MME of the LTE-U network by first random number, the AUTN, the LTE-U network network identity, First encrypted result and second random number are sent to the UE.
Optionally, the AUTN includes message authentication code MAC;
The UE is based on first random number and the AUTN verifies the LTE network, comprising:
The UE generates expectation based on the other parameters in first random number and the AUTN in addition to the MAC and disappears Cease authentication code XMAC;
If the XMAC is identical with the MAC, the UE determination is verified the LTE network.
Optionally, the UE is based on first random number, the AUTN, the network identity of the LTE-U network and institute The first encrypted result is stated to verify the LTE-U network, comprising:
The UE generates the second base according to the network identity of the LTE-U network, first random number and the AUTN Plinth key;
The UE encrypts second random number by second foundation key, obtains third encrypted result;
If first encrypted result is equal to the third encrypted result, the UE is determined to the LTE-U network Be verified.
Optionally, the network identity based on first random number, the AUTN and the LTE-U network generates the Two encrypted results, comprising:
The UE generates third random number, and by second foundation key to second random number and the third Random number carries out whole encryption, obtains the second encrypted result;
Correspondingly, second encrypted result is sent to the MME of the LTE-U network by the UE, comprising:
Second encrypted result and the third random number are sent to the MME of the LTE-U network by the UE;
Correspondingly, the MME of the LTE-U network verifies the UE based on second encrypted result, comprising:
Second random number described in the first foundation key pair of the MME of the LTE-U network by storage and described the Three random numbers carry out whole encryption, obtain the 4th encrypted result;
If second encrypted result and the 4th encrypted result are equal, determining pair of the MME of the LTE-U network The UE's is verified.
Optionally, the MME of the LTE network sends described first at random to the UE by the MME of the LTE-U network Several, the described AUTN, the network identity of the LTE-U network and the first encrypted result, comprising:
The MME of the LTE network stores the expectation return information, and by the first foundation key, described It is expected that return information, first random number and the AUTN are sent to the MME of the LTE-U network;
When the MME of the LTE-U network receives the first foundation key, the expectation return information, described first Random number and when the AUTN, the first foundation key and the expectation return information are stored, are based on described first Foundation key generate the first encrypted result, and by first random number, the AUTN, the LTE-U network network identity The UE is sent to first encrypted result.
Optionally, the AUTN includes MAC;
It is described that first encrypted result is generated based on the first foundation key, comprising:
The MME of the LTE-U network is encrypted by MAC described in the first foundation key pair, obtains described first Encrypted result.
Optionally, the UE is based on first random number, the AUTN, the network identity of the LTE-U network and institute The first encrypted result is stated to verify the LTE-U network, comprising:
The UE generates the second base according to the network identity of the LTE-U network, first random number and the AUTN Plinth key;
The UE encrypts the MAC by second foundation key, obtains the 5th encrypted result;
If first encrypted result be equal to the 5th encryption as a result, if the UE determine to the LTE-U network Be verified.
Optionally, the network identity based on first random number, the AUTN and the LTE-U network generates the Two encrypted results, comprising:
The UE encrypts the return information by second foundation key, obtains the second encrypted result;
Correspondingly, the MME of the LTE-U network verifies the UE based on second encrypted result, comprising:
Return information encryption, obtains the described in the first foundation key pair of the MME of the LTE-U network by storage Six encrypted results;
If the expectation return information that the MME of the LTE-U network is stored is identical as the return information and described 6th encrypted result is equal with second encrypted result, then the MME of the LTE-U network determines that the verifying to the UE is logical It crosses.
Optionally, the security algorithm of the UE is carried in second attach request, the authentication vector includes third base Plinth key, expectation return information, the first random number, authentication signature AUTN, the third foundation key are corresponding for the LTE network Key;
It is described to be interacted based on the authentication vector and the MME of the UE and the LTE-U, to realize that network reflects Power, comprising:
The MME of the LTE network is based on the third foundation key, the expectation return information, first random number It is interacted with the AUTN and the UE, to realize the UE to the verifying of the LTE network and the LTE network Verifying of the MME to the UE;
When being verified, the second random number is generated, and based on described to the UE when the MME of the LTE network is determining The network identity of LTE-U network and the third foundation key generate first foundation key;
The MME of the LTE network generates Non-Access Stratum NAS key based on the security algorithm of the UE, and by described Second random number described in NAS key pair is encrypted, and the 7th encrypted result is obtained;
The MME of the LTE network is by the first foundation key, the third foundation key, the NAS key, described The network identity of LTE-U network, second random number and the 7th encrypted result are sent to the LTE-U network MME;
The MME of the LTE-U network is encrypted by the second random number described in the first foundation key pair, obtains Eight encrypted results, and by the third foundation key, the NAS key, the network identity of the LTE-U network, the described 7th Encrypted result and the 8th encrypted result are sent to the UE;
The UE generates the second foundation key based on the network identity of the third foundation key and the LTE-U network, And the 8th encrypted result is decrypted by second foundation key, the first decrypted result is obtained, the NAS is passed through The 7th encrypted result of key pair is decrypted, and obtains the second decrypted result;
If first decrypted result is identical with second decrypted result, the UE is determined to the LTE-U net Network is verified.
Second aspect provides a kind of network authentication system, and the network authentication system, which has, realizes above-mentioned first aspect The function of middle network authentication method behavior.The network authentication system include the MME of UE, LTE-U network, LTE network MME, HSS, the MME of UE, LTE-U network, LTE network MME, HSS for realizing network authentication provided by above-mentioned first aspect Method.
The third aspect provides a kind of network equipment, includes processor and memory, institute in the structure of the network equipment Memory is stated for storing the program for supporting the network equipment to execute network authentication method provided by above-mentioned first aspect, Yi Jicun Storage is for realizing data involved in network authentication method provided by above-mentioned first aspect.The processor is configured to being used for Execute the program stored in the memory.The operating device of the storage equipment can also include communication bus, and the communication is total Line is for establishing connection between the processor and memory.
Fourth aspect provides a kind of computer readable storage medium, is stored in the computer readable storage medium Instruction, when run on a computer, so that computer executes network authentication method described in above-mentioned first aspect.
5th aspect, provides a kind of computer program product comprising instruction, when run on a computer, so that Computer executes network authentication method described in above-mentioned first aspect.
In above-mentioned second aspect, the third aspect, fourth aspect and the 5th aspect technical effect obtained and first aspect The technical effect that corresponding technological means obtains is approximate, repeats no more herein.
Technical solution provided by the present application has the benefit that in embodiments of the present invention, for not accessing operation First attach request can be sent to the MME of LTE-U network when UE access LTE-U network by the UE of quotient's network, when When the MME of LTE-U network receives first attach request, the net of the LTE-U network can be added in the first attach request Second attach request to generate the second attach request, and is sent to the MME, the MME of LTE network of LTE network by network mark Authorization data request is generated based on second attach request, to request authentication vector to HSS, when HSS receives the authorization data When request, authentication vector is generated based on authorization data request, and the authentication vector is sent to the MME of LTE network, later, The MME of LTE network can be interacted according to the authentication vector received and the MME of UE and LTE-U network, to realize Network authentication.That is to say, the network authentication method provided through the embodiment of the present invention, UE can in access carrier network and When LTE-U network, disposable completion and the authentication between carrier network and LTE-U network, to keep UE smooth simultaneously Access carrier network and LTE-U network, for user use bring conveniently.
Detailed description of the invention
Fig. 1 is a kind of system architecture diagram of network authentication method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of network equipment provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of network authentication method provided in an embodiment of the present invention;
Fig. 4 be MME, LTE-U network of a kind of LTE network provided in an embodiment of the present invention MME and UE between interact into The flow chart of row network authentication method;
Fig. 5 is interaction between the MME and UE of MME, LTE-U network of another LTE network provided in an embodiment of the present invention Carry out the flow chart of network authentication method;
Fig. 6 is interaction between the MME and UE of MME, LTE-U network of another LTE network provided in an embodiment of the present invention Carry out the flow chart of network authentication method.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
Before carrying out detailed explanation to the embodiment of the present invention, first the application scenarios of the embodiment of the present invention are given It introduces.Currently, the tissue such as enterprise, hospital, government unit exchanges for the ease of interior employee communicates, or in order to service User push specific information and business, the one's own network equipment can be disposed in certain region, and using not The frequency spectrum of authorization is communicated by the network equipment of deployment, and wherein the frequency spectrum of unauthorized can be and Wireless Fidelity The identical frequency spectrum of (WIreless-Fidelity, WIFI) frequency spectrum.These are formed and are used by the network equipment of third-party deployment The network that unlicensed spectrum is communicated is LTE-U network.The third party for disposing the LTE-U network can be by deployment The control of the network equipment provides specific business to the user for accessing the LTE-U network.For example, certain hospital is where the hospital In the range of, LTE-U eNB, LTE-U MME, the network equipments such as LTE-U GW are deployed, to constitute a LTE-U net Network, hospital can provide a user medical services by the LTE-U network, and the user for accessing the LTE-U network can then pass through The LTE-U network conveniently searches the information such as the information about doctor, queue number and department position of the hospital.
It should be noted that third party not only can provide a user specific business by the LTE-U network of deployment, and And the network equipment in the network equipment and carrier network in the LTE-U network can also be attached, so that access should The network service that the user of LTE-U network can be provided using carrier network simultaneously.Under the premise of herein, when not accessing fortune currently When seeking the UE access LTE-U network of quotient's network, UE needs are authenticated with the LTE-U network and carrier network.And the application The network authentication method and system of offer can be used for the UE of current non-access carrier network when accessing LTE-U network, In the scene authenticated with carrier network and LTE-U network.
After the application scenarios to the embodiment of the present invention are introduced, next to the present embodiments relate to system Framework is illustrated.
Fig. 1 is a kind of system architecture diagram of network authentication method provided in an embodiment of the present invention.As shown in Figure 1, the system In include UE 101, the eNB 102 of LTE-U network, the MME 103 of LTE-U network, the MME 104 and HSS 105 of LTE network. Wherein UE 101 is connect with the eNB 102 of LTE-U network, and the MME 103 of LTE-U network is connect with the MME 104 of LTE network, MME 104 and HSS 105 connection of LTE network.
Wherein, UE 101 can be the user equipmenies such as smart phone, tablet computer.When carrying out network authentication, UE 101 initiate attach request, the attach request that the eNB 102 of LTE-U network sends UE 101 to the eNB 102 of LTE-U network The MME 103 of LTE-U network, the MME 103 of LTE-U network and the MME 104 of LTE network is transmitted to be somebody's turn to do according to what UE was sent Attach request is interacted with UE, to realize between the MME 103 of UE 101, LTE-U network and the MME 104 of LTE network Authentication.In this process, the MME 104 of LTE network can be according to attach request that UE 101 is sent, LTE-U network The network identity of network identity and LTE network requests authentication vector to HSS, and HSS 105 generates authentication according to the information received Vector, and the authentication vector is back to the MME 104 of LTE network, so that the MME 103 of LTE-U network and LTE network MME 104 is authenticated according to the authentication vector and UE 101.
Fig. 2 is a kind of network equipment infrastructure schematic diagram provided in an embodiment of the present invention.The network equipment can be in Fig. 1 UE, eNB, MME or HSS.Referring to fig. 2, which includes at least one processor 201, communication bus 202, memory 203 and at least one communication interface 204.
Processor 201 can be a general central processor (Central Processing Unit, CPU), micro process Device, application-specific integrated circuit (application-specific integrated circuit, ASIC) or one or more A integrated circuit executed for controlling application scheme program.
Communication bus 202 may include an access, and information is transmitted between said modules.
Memory 203 can be read-only memory (read-only memory, ROM) or can store static information and instruction Other types of static storage device, random access memory (random access memory, RAM)) or can store The other types of dynamic memory of information and instruction, is also possible to Electrically Erasable Programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storages, optical disc storage (including compression optical disc, laser disc, light Dish, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or Store have instruction or data structure form desired program code and can by any other medium of computer access, but It is without being limited thereto.Memory 203, which can be, to be individually present, and is connected by communication bus 202 with processor 201.Memory 203 It can be integrated with processor 201.
Communication interface 204, using the device of any transceiver one kind, for other equipment or communication, such as Ethernet, wireless access network (RAN), WLAN (Wireless Local Area Networks, WLAN) etc..
In the concrete realization, as one embodiment, processor 201 may include one or more CPU, such as in Fig. 2 Shown in CPU0 and CPU1.
In the concrete realization, as one embodiment, the network equipment may include multiple processors, such as shown in Fig. 2 Processor 201 and processor 205.Each of these processors can be monokaryon (single-CPU) processor, It is also possible to multicore (multi-CPU) processor.Here processor can refer to one or more equipment, circuit, and/or For handling the processing core of data (such as computer program instructions).
In the concrete realization, as one embodiment, the network equipment can also include output equipment 206 and input equipment 207.Output equipment 206 and processor 201 communicate, and can show information in many ways.For example, output equipment 206 can be with It is liquid crystal display (liquid crystal display, LCD), light emitting diode (light emitting diode, LED) Show equipment, cathode-ray tube (cathode ray tube, CRT) shows equipment or projector (projector) etc..Input Equipment 207 and processor 201 communicate, and can receive the input of user in many ways.For example, input equipment 207 can be mouse Mark, keyboard, touch panel device or sensing equipment etc..
The above-mentioned network equipment can be a general purpose computing device either dedicated computing machine equipment.Specific In realization, which can be desktop computer, portable computer, network server, palm PC (Personal Digital Assistant, PDA), cell phone, tablet computer, wireless terminal device, communication equipment or embedded device.The present invention Embodiment does not limit the type of the network equipment.
Wherein, memory 203 is used to store the program code for executing application scheme, and is held by processor 201 to control Row.Processor 201 is for executing the program code 208 stored in memory 203.May include in program code 208 one or Multiple software modules.The network equipment shown in Fig. 1 can pass through the program code 208 in processor 201 and memory 203 In one or more software modules, to realize network authentication.
By foregoing description, to the present embodiments relate to application scenarios and after system architecture is explained, Next the specific implementation process of the embodiment of the present invention is described in detail.
Fig. 3 is a kind of flow chart of network authentication method provided in an embodiment of the present invention, as shown in figure 3, this method includes Following steps:
First attach request is sent to the MME of LTE-U network by step 301:UE.
Wherein, for the UE of non-access carrier network, when UE access LTE-U network, it is attached that UE can send first Request (Attach Request) to the eNB of LTE-U network, when the eNB of LTE-U network receives first attach request When, which is transmitted to the MME of LTE-U network by the eNB of LTE-U network.
It should be noted that first attach request is NAS message, the eNB of LTE-U network can not parse first attachment Request.Also, international mobile subscriber identity (the International of the UE can be carried in first attach request Mobile Subscriber Identification Number, IMSI) and the UE security algorithm.Wherein, the UE IMSI can be used for the unique identification UE, also, can determine the current affiliated mobile network of the UE by the IMSI of the UE.Separately Outside, the security algorithm of the UE refers to the Encryption Algorithm and protection algorithm integrallty that the UE is supported.
Step 302: when the MME of LTE-U network receives the first attach request from UE, in the first attach request The network identity of LTE-U network is added, to generate the second attach request.
When the MME of LTE-U network receives the first attach request, the network identity of itself can be added to this first In attach request, to generate the second attach request.After generating the second attach request, the MME of LTE-U network can basis The IMSI of the UE carried in first attach request, determines the MME of the corresponding LTE network of the UE.
Second attach request is sent to the MME of LTE network by the MME of step 303:LTE-U network.
After determining the MME of the corresponding LTE network of the UE, the MME of LTE-U network can be asked the second attachment of generation Seek the MME for being sent to determining LTE network.
Step 304: when the MME of LTE network receives the second attach request, being based on the second attach request, sent to HSS Authorization data request.
When the MME of LTE network receives the second attach request, by foregoing description it is found that being taken in second attach request The network identity of IMSI, security capabilities and LTE-U network with UE, at this point, the MME of LTE network second can adhere to this The network identity of LTE network is added in request, to generate authorization data request, and authorization data request is sent to HSS。
Step 305: when HSS receives authorization data request, network identity and LTE network based on LTE-U network Network identity, generate authentication vector.
When receiving authorization data request, HSS can be according to the IMSI carried in authorization data request, from storage Multiple long term keys in determine the corresponding long term keys of IMSI of the UE, which is referred to as mobile phone identification code (Key identifier, Ki).Later, HSS can generate LTE according to the network identity of determining long term keys and LTE network The corresponding third foundation key of network, and generate LTE-U network using the network identity of the long term keys and LTE-U network and correspond to First foundation key.In addition to this, after Ki, HSS can also generate the first random number and sequence number, and according to this first Random number and sequence number generate authentication signature (Authentication Token, AUTN) and expectation return information.Wherein, AUTN Including sequence number, message authentication code (Message authentication code, MAC), authentication management field (Authentication Management Field, AMF) etc..
It should be noted that the authentication vector may include first foundation key, third foundation key, the first random number, It is expected that return information and AUTN, can not also include first foundation key, third foundation key, the first random number, phase are only included Hope return information and AUTN.Alternatively, the authentication vector can not also include third foundation key, and including first foundation key, First random number, expectation return information and AUTN.When the authentication vector does not include first foundation key or third foundation key When, HSS may not necessarily generate the first foundation key or third foundation key in above process.
Step 306:HSS sends authentication vector to the MME of LTE network.
Step 307: when the MME of LTE network receives the authentication vector, based on the authentication vector and UE and LTE-U The MME of network is interacted, to realize network authentication.
It, can be according to the authentication vector and UE and LTE-U network when the MME of LTE network receives the authentication vector MME interact, thus complete LTE network to the verifying of UE, LTE-U network to the verifying of UE and UE to LTE network, The verifying of LTE-U network.
It should be noted that in embodiments of the present invention, UE can simultaneously verify LTE-U network and LTE network, It can also first be proved to be successful mutually with LTE network and then be mutually authenticated with LTE-U network.In addition, when UE is right simultaneously When LTE-U network and LTE network are verified, UE can also be carried out LTE-U network using parameter different in authentication vector Verifying.MME specifically based on the authentication vector and UE and LTE-U network interacts to carry out the realization of network authentication Journey will be described in detail by subsequent embodiment.
It in embodiments of the present invention,, can be with when UE access LTE-U network for the UE of non-access carrier network First attach request is sent to the MME of LTE-U network, it, can when the MME of LTE-U network receives first attach request The network identity of the LTE-U network to be added in the first attach request, to generate the second attach request, and this is second attached Request be sent to the MME of LTE network, the MME of LTE network is based on second attach request and generates authorization data request, with to HSS requests authentication vector, when HSS receives authorization data request, generates authentication vector based on authorization data request, and The authentication vector is sent to the MME of LTE network, later, the MME of LTE network can according to the authentication vector received with The MME of UE and LTE-U network is interacted, to realize network authentication.It that is to say, the network provided through the embodiment of the present invention Method for authenticating, UE can be disposable to complete and carrier network and LTE-U net in access carrier network and LTE-U network Authentication between network is brought to allow UE while smoothly access carrier network and LTE-U network for the use of user Convenience.
Based on foregoing description, UE can simultaneously be verified LTE-U network and LTE network, can also elder generation and LTE network It is proved to be successful and then is mutually authenticated with LTE-U network mutually.In addition, when UE is simultaneously to LTE-U network and LTE network When being verified, UE can also be verified LTE-U network using parameter different in authentication vector.Below in conjunction with attached Figure, is interacted the MME of LTE network, based on the authentication vector and the MME of UE and LTE-U network to realize network authentication Three kinds of implementations be explained respectively.
Fig. 4 is the flow chart of the first method based on authentication vector progress network authentication provided in an embodiment of the present invention, As shown in Fig. 4, method includes the following steps:
The MME of step 401:LTE network stores the expectation return information in authentication vector.
Based on the description in previous embodiment, authentication vector may include first foundation key, the first random number, it is expected back Expectation in the authentication vector can be replied and be believed when the MME of LTE network receives the authentication vector by complex information and AUTN Breath is stored, and is verified after remaining to UE.And first foundation key, the first random number and AUTN in the authentication vector The MME of LTE-U network can be then forwarded to.
First foundation key, the first random number and AUTN are sent to LTE-U network by the MME of step 402:LTE network MME。
Step 403: when the MME of LTE-U network receives first foundation key, the first random number and AUTN, by first Foundation key is stored, and generates the second random number, and based on first foundation key and the second generating random number first encryption knot Fruit.
When receiving first foundation key, the first random number and the AUTN of LTE network transmission, the MME of LTE-U network First foundation key can be stored, remain subsequent to verify UE.At the same time, the MME of LTE-U network may be used also To generate the first encrypted result based on first foundation key, which verifies LTE-U network for UE.
Wherein, when receiving first foundation key, the first random number and AUTN, the MME of LTE-U network can use with Machine number generator generates the second random number, and second random number is encrypted by first foundation key pair, to obtain the One encrypted result.
The MME of step 404:LTE-U network encrypts the first random number, the network identity of AUTN, LTE-U network, first As a result UE is sent to the second random number.
It, can be by the first random number, AUTN, LTE-U network after the MME of LTE-U network generates the first encrypted result Network identity and the first encrypted result and the second random number for generating the first encrypted result be sent to LTE-U network ENB, then by LTE-U network eNB by first random number, the network identity of AUTN, LTE-U network, the first encrypted result and Second random number is transmitted to UE.
Step 405: when UE receive the first random number, the network identity of AUTN, LTE-U network, the first encrypted result and When the second random number, based on the first random number, the network identity of AUTN, LTE-U network, the first encrypted result and the second random number LTE network and LTE-U network are verified.
When UE receives the first random number, AUTN and the first encrypted result, UE can be according to the first random number and AUTN LTE network is verified, LTE-U network is verified according to the first random number, AUTN and the first encrypted result.
When UE verifies LTE network, UE can be based on other ginsengs in the first random number and AUTN in addition to MAC Number generates expectation message authentication code XMAC;If XMAC is identical with MAC, UE determination is verified LTE network.
Wherein, the phase is calculated in Ki, the first random number, the sequence number in AUTN and the AMF that UE can be stored according to itself It hopes message authentication code (Expected Message Authentication Code, XMAC).Based on step in previous embodiment 305 description is it is found that include MAC in the AUTN, and the MAC is HSS according in determining Ki, the first random number, AUTN Sequence number and AMF be calculated, after UE generates XMAC, if the XMAC and MAC is identical, illustrate what HSS was determined The Ki stored in the Ki and UE is consistent.And the Ki that HSS is determined is determined according to the IMSI of UE, that is to say, what HSS was determined Ki is actually the Ki that the UE is stored in LTE network side, and therefore, when XMAC and MAC is identical, UE is assured that current LTE network is really, to that is to say, UE is verified LTE network.
When UE verifies LTE-U network, UE can according to the network identity of LTE-U network, the first random number and AUTN generates the second foundation key;UE encrypts the second random number by the second foundation key, obtains third encrypted result; If the first encrypted result is equal to third encrypted result, UE determination is verified LTE-U network.
Wherein, when UE verifies LTE-U network, UE can be according to the network of Ki, LTE-U network of itself storage Mark, the first random number and AUTN generate the second foundation key.Later, second random number is carried out by the second foundation key Encryption, to obtain third encrypted result.Since first foundation key is the corresponding key of LTE-U network, the first encrypted result It is to be encrypted by the second random number of first foundation key pair, therefore, if the third encrypted result and first adds Close result is identical, then illustrate second foundation key and first foundation key be it is identical, that is to say, UE can be determined pair LTE-U network is verified., whereas if third encrypted result and the first encrypted result difference, then illustrate that the second basis is close Key is different with first foundation key, at this point, UE will failure to the verifying of LTE-U network.
Step 406: when UE, which is determined, to be verified to LTE network and LTE-U network, generate return information and third with Machine number, and the network identity based on LTE-U network, the second encrypted result of the first random number, AUTN and third generating random number.
When UE is determined to LTE network after being verified, can by the Ki of itself storage and receive first with Machine number generates return information, which verifies UE for subsequent LTE network.
When after being verified, third random number can be generated to LTE-U network in UE determination, later, UE can basis The second foundation key generated by the network identity of LTE-U network, the first random number and AUTN, it is random to second received Number and the third random number generated carry out whole encryption, to obtain the second encrypted result.
Second encrypted result, third random number and return information are sent to the MME of LTE-U network by step 407:UE.
After UE generates return information and the second encrypted result, by the second encrypted result, third random number and it can return Complex information is sent to the eNB of LTE-U network, and by second encrypted result, third random number and is returned by the eNB of LTE-U network Complex information is forwarded to the MME of LTE-U network.
Step 408: when the MME of LTE-U network receives the second encrypted result and third random number, based on the second encryption As a result UE is verified.
Based on the description in abovementioned steps 403 it is found that being stored with first foundation key in the MME of LTE-U network, also, Second random number is to be generated by the MME of LTE-U network, and be stored in the MME of the LTE-U network, therefore, when LTE-U net After the MME of network receives the second encrypted result and third random number, it can be stored by the first foundation key pair of storage Second random number and the third random number received carry out whole encryption, to obtain the 4th encrypted result.If the 4th adds Close result is identical with the second encrypted result, then illustrates to store in the MME for the second foundation key and LTE-U network that UE is generated First foundation key be it is identical, that is to say, the MME of LTE-U network, which can be determined, is verified UE., whereas if the Four encrypted results and the second encrypted result difference, then illustrate that first foundation key and the second foundation key are different, at this point, Authentication failed of the LTE-U network to UE.
Step 409: when the MME of LTE-U network receives return information, return information being sent to LTE network MME。
Based on the description in step 407, the second encrypted result, third random number and return information are sent to LTE-U by UE The MME of network, wherein the MME of LTE-U network can use the second encrypted result and third random number, by step 408 Mode UE is verified, and the return information for receiving, due to the return information be for LTE network to UE into Row verifying, therefore, which can be directly transmitted to the MME of LTE network by the MME of LTE-U network.
Step 410: when the MME of LTE network receives return information, UE being verified based on return information.
Based on the description in step 401 it is found that being stored with desired return information in the MME of LTE network, and the expectation is replied Information is by HSS according to determining Ki and the first generating random number.Therefore, when the MME of LTE network receives the return information When, if the return information is identical with desired return information, the MME of LTE network can then be determined it is expected back for generating The Ki of complex information and Ki for generating return information be it is identical, that is to say, the Ki and the UE itself of the storage of LTE network side The Ki of storage is consistent, at this point, the MME of the LTE network can determine that current UE is truly and effectively, to that is to say, it should The MME of LTE network can be determined and is verified to UE.
In embodiments of the present invention, after the MME of LTE network receives authentication vector, the MME and LTE- of LTE network The MME of U network can send the first random number, AUTN and the first encrypted result to UE, when UE receive first random number, After AUTN and the first encrypted result, can simultaneously according to the first random number, AUTN and the first encrypted result to LTE-U network and LTE network is verified, and later, the MME of LTE-U network and the MME of LTE network are further according to the return information and second from UE Encrypted result verifies UE.It that is to say, the network authentication method provided through the embodiment of the present invention, UE can be transported in access Seek quotient's network and when LTE-U network, the authentication being completed at the same time between carrier network and LTE-U network, to make UE can be with Access carrier network and LTE-U network simultaneously are brought conveniently for the use of user.
The second random number that UE is generated according to LTE-U network is described through the foregoing embodiment and other parameters are right simultaneously Next the method that LTE-U network and LTE network are verified will introduce another kind UE simultaneously to LTE-U network and LTE net The method that network is verified.
Fig. 5 is the flow chart of the second provided in an embodiment of the present invention method that network authentication is carried out based on authentication vector, As shown in Fig. 5, method includes the following steps:
The MME of step 501:LTE network stores the expectation return information in authentication vector.
Description based on step 305 in previous embodiment it is found that authentication vector include first foundation key, it is first random Number, expectation return information and AUTN can deposit desired return information when the MME of LTE network receives authentication vector Storage, verifies UE so as to subsequent.
The MME of step 502:LTE network sends first foundation key, expectation return information, the first random number and AUTN To the MME of LTE-U network.
After the MME of LTE network is stored desired return information, in addition to the MME of LTE-U network send authentication to In amount except remaining first foundation key, the first random number and AUTN, it is also necessary to which desired return information is also sent LTE-U The MME of network.
Step 503: when the MME of LTE-U network receive first foundation key, expectation return information, the first random number and When AUTN, first foundation key and desired return information are stored, the first encrypted result is generated based on first foundation key.
It, can when the MME of LTE-U network receives first foundation key, expectation return information, the first random number and AUTN To store first foundation key and desired return information, UE is verified so as to subsequent.At the same time, LTE-U net The MME of network can generate the first encrypted result based on first foundation key.
It should be noted that by the description of step 305 in previous embodiment it is found that in AUTN include MAC, work as LTE-U When the MME of network receives first foundation key, expectation return information, the first random number and AUTN, first foundation can be passed through MAC encryption in key pair AUTN, to obtain the first encrypted result.
The MME of step 504:LTE-U network encrypts the first random number, the network identity of AUTN, LTE-U network and first As a result it is sent to UE.
After generating the first encrypted result, the MME of LTE-U network can be by the first random number, AUTN, LTE-U network Network identity and first encrypted result be sent to the eNB of LTE-U network, and it is random by first by the eNB of the LTE-U network Number, the network identity of AUTN, LTE-U network and the first encrypted result are transmitted to UE.
Step 505: when UE receives the first random number, the network identity of AUTN, LTE-U network and the first encrypted result When, based on the first random number, the network identity of AUTN, LTE-U network and the first encrypted result to LTE network and LTE-U network It is verified.
When UE receives the first random number, the network identity of AUTN, LTE-U network and the first encrypted result, UE can be with LTE network is verified according to the first random number and AUTN, according to the first random number, the network identity of AUTN, LTE-U network LTE-U network is verified with the first encrypted result.
Wherein, the specific implementation that UE verifies LTE network can be with reference to UE in step 405 to LTE network Verification mode, the embodiment of the present invention repeat no more.
When UE verifies LTE-U network, UE can according to the network identity of LTE-U network, the first random number and AUTN generates the second foundation key;MAC is encrypted by the second foundation key, obtains the 5th encrypted result;If first Encrypted result is equal to the 5th encryption as a result, then UE determination is verified LTE-U network.
Wherein, when UE verifies LTE-U network, UE can be according to the network of Ki, LTE-U network of itself storage Mark, the first random number and AUTN generate the second foundation key, later, by second foundation key to including in AUTN MAC is encrypted, to obtain the 5th encrypted result.Since first foundation key is the corresponding key of LTE-U network, first adds It is close the result is that encrypted by first foundation key pair MAC, and the 5th encryption is the result is that by the second foundation key to MAC What encryption obtained.Therefore, if the first encrypted result is identical with the 5th encrypted result, illustrate first foundation key and the second base Plinth key be it is identical, that is to say, UE, which can be determined, is verified LTE-U network., whereas if the 5th encrypted result and First encrypted result is different, then illustrates that the second foundation key is different with first foundation key, at this point, UE tests LTE-U network Card will failure.
Step 506: when UE, which is determined, to be verified to LTE network and LTE-U network, generating return information, and be based on The network identity of LTE-U network, the first random number and AUTN generate the second encrypted result.
When UE is determined to LTE network when being verified, by the Ki of itself storage and can receive first random Number generates return information.
LTE-U network is verified when UE is determining, and after generation return information, UE can be by step 505 According to the second foundation key that the network identity of LTE-U network, the first random number and AUTN are generated, which is added It is close, to obtain the second encrypted result.
Second encrypted result and return information are sent to the MME of LTE-U network by step 507:UE.
After UE generates return information and the second encrypted result, the return information and the second encrypted result can be sent To the eNB of LTE-U network, and the return information and the second encrypted result are transmitted to LTE-U network by the eNB of LTE-U network MME.
Step 508: when the MME of LTE-U network receives return information and the second encrypted result, being based on the return information UE is verified with the second encrypted result.
Based on the description in step 503 it is found that being stored with first foundation key and expectation reply in the MME of LTE-U network Information, wherein the expectation return information is the Ki and the first generating random number by HSS according to storage.As the MME of LTE-U network After receiving return information and the second decrypted result, the return information can be compared with desired return information first, Later, the MME of LTE-U network can be encrypted by the first foundation key pair return information of itself storage, obtain the Six encrypted results.Since the return information is by UE according to the Ki itself stored and the first generating random number, if should Return information is identical with desired return information, and the 6th encrypted result and the second encrypted result are also identical, then illustrates that UE is generated The second foundation key and LTE-U network MME storage first foundation key be consistent, at this point, the MME of LTE-U network Can confirm current UE be it is authentic and valid, that is to say, the MME of LTE-U network, which can be determined, is verified UE. , whereas if the 6th encrypted result and the second encrypted result difference, then illustrate first foundation key and the second foundation key be Different, at this point, authentication failed of the LTE-U network to UE.
Return information is sent to the MME of LTE network by the MME of step 509:LTE-U network.
The return information can be sent to LTE network when receiving return information by the MME of LTE-U network MME, it is of course also possible to which the return information to be sent to the MME. of LTE network after completing to the verifying of UE
Step 510: when the MME of LTE network receives return information, UE being verified based on return information.
When the MME of LTE network receives return information, UE is verified based on the return information specific implementation side Formula can be repeated no more with reference to the implementation in step 410, the embodiment of the present invention.
In embodiments of the present invention, after the MME of LTE network receives authentication vector, the MME and LTE- of LTE network The MME of U network can send the first random number, AUTN and the first encrypted result to UE, wherein first encrypted result is LTE- What the MME of U network was obtained after encrypting to the MAC in AUTN, when UE receives first random number, the encryption of AUTN and first As a result after, LTE-U network and LTE network can be tested according to the first random number, AUTN and the first encrypted result simultaneously Card, later, the MME of the MME of LTE-U network and LTE network further according to from UE return information and the second encrypted result to UE It is verified, wherein second encrypted result is that UE is encrypted to obtain to return information.It that is to say, implement in the present invention In the network authentication method that example provides, LTE-U network and UE need not regenerate random number, only need to be to the parameter in authentication vector Carrying out encryption can be completed mutual verifying, simplify operation.The network authentication method provided through the embodiment of the present invention, UE can be with In access carrier network and LTE-U network, the authentication being completed at the same time between carrier network and LTE-U network, thus Allow UE access carrier network and LTE-U network simultaneously, is brought conveniently for the use of user.
The aforementioned attached Figure 4 and 5 of combination describe UE while verifying to LTE-U network and LTE network, later, LTE-U Two kinds of verification methods that the MME of network and the MME of LTE network verify UE, next, UE elder generation will be introduced in conjunction with attached drawing 6 It is verified mutually with LTE network, then to the network authentication method that LTE-U network is verified.
Fig. 6 is that provided in an embodiment of the present invention the third carries out the flow chart of the method for network authentication based on authentication vector, In the method, the MME of LTE network is primarily based on third foundation key, expectation return information, and the first random number and AUTN pass through Method in step 601- step 60 is interacted with UE, to complete the mutual verifying between UE, later, is carried out such as Fig. 6 institute Show, method includes the following steps:
The MME of step 601:LTE network stores the third foundation key in authentication vector with desired return information.
Based on the description of step 305 in previous embodiment, authentication vector may include third foundation key, expectation reply letter Breath, the first random number and AUTN.When in authentication vector include third foundation key, expectation return information, the first random number and When AUTN, the MME of LTE network can when receiving the authentication vector, by the authentication vector third foundation key and the phase It hopes that return information is stored, UE is verified so as to subsequent.
First random number and AUTN are sent to UE by the MME of step 602:LTE network.
After the MME of LTE network is stored third foundation key and desired return information, the MME of LTE network Can by the authentication vector the first random number and AUTN be sent to the MME of LTE-U network, the MME of LTE-U network is connecing After receiving first random number and AUTN, first random number and AUTN can be sent to the eNB, LTE- of LTE-U network The eNB of U network is receiving the first random number and AUTN and then first random number and AUTN is transmitted to UE.
Step 603: when UE receives the first random number and AUTN, be based on the first random number and AUTN, to LTE network into Row verifying.
The specific implementation of this step can be based on the first random number and AUTN to LTE network with reference to UE in step 405 The implementation verified, the embodiment of the present invention repeat no more.
Step 604: when being verified, return information being generated to LTE network when UE is determining.
The specific implementation of this step can refer in step 406 when UE determines life to LTE network when being verified At the related description of return information, the embodiment of the present invention is repeated no more.
Return information is sent to the MME of LTE network by step 605:UE.
After UE generates return information, it can be sent to by the return information via the eNB and MME of LTE-U network The MME of LTE network.
Step 606: when the MME of LTE network receives return information, UE being verified based on the return information.
The specific implementation of this step can be based on return information with reference to the MME of LTE network in step 410 and carry out to UE The related description of verifying, the embodiment of the present invention repeat no more.
Step 607: when being verified, the second random number being generated, and be based on LTE-U to UE when the MME of LTE network is determining The network identity and third foundation key of network generate first foundation key, and the security algorithm based on UE generates NAS key, and It is encrypted by the second random number of NAS key pair, obtains the 7th encrypted result.
Based on the description in step 302 it is found that the MME of LTE-U network is added to LTE-U network in the first attach request Network identity, to generate the second attach request, and second attach request has been sent to the MME of LTE network, because This, when the MME of LTE network is determined to UE when being verified, can network identity based on LTE-U network and third basis it is close Key generates first foundation key.At the same time, the MME of LTE network can use randomizer and generate the second random number.
It should be noted that due to further include in the second attach request the UE security algorithm, when LTE network After MME generates the second random number and first foundation key, NAS key can be generated according to the security algorithm of the UE.Later, The MME of LTE network can be encrypted by second random number of NAS key pair, obtain the 7th encrypted result.
The MME of step 608:LTE network by first foundation key, third foundation key, NAS key, LTE-U network net Network mark, the second random number and the 7th encrypted result are sent to the MME of LTE-U network.
Step 609: when the MME of LTE-U network receives first foundation key, third foundation key, NAS key, LTE-U When the network identity of network, the second random number and seven encrypted results, added by the second random number of first foundation key pair It is close, obtain the 8th encrypted result.
The MME of step 610:LTE-U network is by third foundation key, NAS key, the network identity of LTE-U network, the 7th Encrypted result and the 8th encrypted result are sent to UE.
The MME of LTE-U network is by third foundation key, NAS key, the network identity of LTE-U network, the 7th encrypted result It is sent to the eNB of LTE-U network with the 8th encrypted result, then UE is transmitted to by the eNB of LTE-U network.
Step 611: when UE receives third foundation key, NAS key, the network identity of LTE-U network, the 7th encryption knot When fruit and eight encrypted results, the second foundation key is generated based on the network identity of third foundation key and LTE-U network, and lead to It crosses the second foundation key the 8th encrypted result is decrypted, obtains the first decrypted result, encrypted and tied by NAS key pair the 7th Fruit is decrypted, and obtains the second decrypted result.
Since first foundation key is the MME of LTE network according to the life of the network identity of third foundation key and LTE-U network At, therefore, in order to verify the authenticity of LTE-U network, when UE receives the network mark of third foundation key and LTE-U network When knowledge, the second foundation key can be generated according to the network identity of the third foundation key and LTE-U network, thus verifying second Whether foundation key and first foundation key identical, realizes the verifying to LTE-U network with this.
It should be noted that information is tampered during the MME of LTE-U network transmits information to UE in order to prevent, The MME of LTE-U network utilizes the by the method in step 609 there is no first foundation key is sent directly to UE One foundation key encrypts the second random number to obtain the 8th encrypted result, and the 8th encrypted result is sent to UE.When After UE receives the 8th encrypted result, UE can be decrypted the 8th encrypted result by second foundation key, be obtained First decrypted result, and decrypted by the 7th encrypted result of NAS key pair, obtain the second decrypted result.
Step 612:UE is based on the first decrypted result and the second decrypted result, verifies to LTE-U network.
Since the MME that the 8th encrypted result is LTE-U network is encrypted by the second random number of first foundation key pair It obtains, and the MME that the 7th encrypted result is LTE network is encrypted by the second random number of NAS key pair, because This, is when UE decrypts the 8th encrypted result by the second foundation key, after being decrypted by the 7th encrypted result of NAS key pair, If the first encrypted result and the second encrypted result are equal, illustrate the second foundation key of UE generation and first foundation key is It is identical, it that is to say, UE can determine that the LTE-U network is genuine and believable, at this point, UE can be determined to LTE-U network Be verified.
In embodiments of the present invention, after the MME of LTE network receives authentication vector, the MME of LTE network can be first It is interacted based on third foundation key, the first random number, expectation return information and the AUTN and UE in authentication vector, to complete With the mutual authentication of UE, later, first foundation key is can be generated in the MME of LTE network, the second random number obtains NAS key, and The first foundation key, the second random number and NAS key are sent to the MME of LTE-U network, later, the MME of LTE-U network Network authentication can be carried out by the first foundation key, the second random number and NAS key with UE.It that is to say, through the invention The network authentication method that embodiment provides, UE can be completed at the same time and run in access carrier network and LTE-U network Authentication between quotient's network and LTE-U network is user to allow UE access carrier network and LTE-U network simultaneously Use bring conveniently.
After network authentication method provided in an embodiment of the present invention is introduced, next the embodiment of the present invention is mentioned The network authentication system of confession is introduced.
The embodiment of the invention provides a kind of network authentication system, which includes UE, LTE-U network The MME and HSS of MME, LTE network.
The MME of the LTE-U network is used to execute the step 302 and 303 in above-described embodiment;
The MME of the LTE network is used to execute the step 304 in above-described embodiment;
The HSS is used to execute the step 305 and 306 in above-described embodiment;
The MME of the LTE network is used to execute the step 307 in above-described embodiment.
Optionally, the authentication vector includes first foundation key, expectation return information, the first random number and authentication signature AUTN, the first foundation key are the corresponding key of the LTE-U network;
The MME of the LTE network is specifically used for storing the expectation return information, and passes through the MME of the LTE-U network First random number, the AUTN, the network identity of the LTE-U network and the first encrypted result, institute are sent to the UE The first encrypted result is stated to be generated by the MME of the LTE-U network based on the first foundation key;
The UE, which is used to work as, receives first random number, the AUTN, the network identity of the LTE-U network and institute When stating the first encrypted result, the LTE network is verified based on first random number and the AUTN, and based on described First random number, the AUTN, the network identity of the LTE-U network and first encrypted result are to the LTE-U network It is verified;
The UE is also used to generate when determination is verified the LTE network and the LTE-U network and reply letter Breath, and the second encrypted result is generated based on the network identity of first random number, the AUTN and the LTE-U network;
The UE is also used to for second encrypted result being sent to the MME of the LTE-U network, and the reply is believed Breath is sent to the MME of LTE network;
The MME of the LTE-U network is used for when receiving second encrypted result, is based on second encrypted result The UE is verified, when the MME of the LTE network receives the return information, is based on the expectation return information The UE is verified with the return information.
Optionally, the MME of the LTE network is specifically used for:
The expectation return information is stored, and by the first foundation key, first random number and described AUTN is sent to the MME of the LTE-U network;
The MME of the LTE-U network is also used to when receiving the first foundation key, first random number and described When AUTN, the first foundation key is stored, the first encrypted result is generated based on the first foundation key, and by institute It states the first random number, the AUTN, the network identity of the LTE-U network and first encrypted result and is sent to the UE.
Optionally, the MME of the LTE-U network is specifically used for:
The second random number is generated, and is encrypted by the second random number described in the first foundation key pair, institute is obtained State the first encrypted result;
By first random number, the AUTN, the network identity of the LTE-U network, first encrypted result and Second random number is sent to the UE.
Optionally, the AUTN includes message authentication code MAC;
The UE is specifically used for:
Expectation message authentication is generated based on the other parameters in first random number and the AUTN in addition to the MAC Code XMAC;
If the XMAC is identical with the MAC, it is determined that be verified to the LTE network.
Optionally, the UE is specifically used for:
The second foundation key is generated according to the network identity of the LTE-U network, first random number and the AUTN;
Second random number is encrypted by second foundation key, obtains third encrypted result;
If first encrypted result is equal to the third encrypted result, it is determined that the verifying to the LTE-U network Pass through.
Optionally, the UE is specifically used for:
Third random number is generated, and by second foundation key to second random number and the third random number Whole encryption is carried out, the second encrypted result is obtained;
Second encrypted result and the third random number are sent to the MME of the LTE-U network;
Correspondingly, the MME of the LTE-U network is specifically used for:
Second random number described in the first foundation key pair by storage and the third random number carry out whole add It is close, obtain the 4th encrypted result;
If second encrypted result and the 4th encrypted result are equal, it is determined that be verified to the UE.
Optionally, the MME of the LTE network is specifically used for:
The expectation return information is stored, and by the first foundation key, the expectation return information, described First random number and the AUTN are sent to the MME of the LTE-U network;
The MME of the LTE-U network is used for when receiving the first foundation key, the expectation return information, described First random number and when the AUTN, the first foundation key and the expectation return information is stored, based on described First foundation key generate the first encrypted result, and by first random number, the AUTN, the LTE-U network network Mark and first encrypted result are sent to the UE.
Optionally, the AUTN includes MAC;
The MME of the LTE-U network is specifically used for:
It is encrypted by MAC described in the first foundation key pair, obtains first encrypted result.
Optionally, the UE is specifically used for:
The second foundation key is generated according to the network identity of the LTE-U network, first random number and the AUTN;
The MAC is encrypted by second foundation key, obtains the 5th encrypted result;
If first encrypted result be equal to the 5th encryption as a result, if determine verifying to the LTE-U network Pass through.
Optionally, the UE is specifically used for:
The return information is encrypted by second foundation key, obtains the second encrypted result;
Correspondingly, the MME of the LTE-U network is specifically used for:
The encryption of return information described in the first foundation key pair by storage, obtains the 6th encrypted result;
If the expectation return information that the MME of the LTE-U network is stored is identical as the return information and described 6th encrypted result is equal with second encrypted result, it is determined that is verified to the UE.
Optionally, the security algorithm of the UE is carried in second attach request, the authentication vector includes third base Plinth key, expectation return information, the first random number, authentication signature AUTN, the third foundation key are corresponding for the LTE network Key;
The MME of the LTE network is specifically used for, based on the third foundation key, the expectation return information, described the One random number and the AUTN and UE are interacted, to realize the UE to the verifying of the LTE network and described Verifying of the MME of LTE network to the UE;
The MME of the LTE network is also used to generate the second random number, and base when determining to the UE when being verified In the network identity and the third foundation key of the LTE-U network, first foundation key is generated;
The MME of the LTE network is also used to the security algorithm based on the UE and generates Non-Access Stratum NAS key, and passes through Second random number described in the NAS key pair is encrypted, and the 7th encrypted result is obtained;
The MME of the LTE network is also used to the first foundation key, the third foundation key, the NAS is close Key, the network identity of the LTE-U network, second random number and the 7th encrypted result are sent to the LTE-U net The MME of network;
The MME of the LTE-U network is specifically used for being added by the second random number described in the first foundation key pair It is close, obtain the 8th encrypted result, and by the third foundation key, the NAS key, the LTE-U network network identity, 7th encrypted result and the 8th encrypted result are sent to the UE;
The UE is specifically used for generating the second base based on the network identity of the third foundation key and the LTE-U network Plinth key, and the 8th encrypted result is decrypted by second foundation key, the first decrypted result is obtained, is passed through The 7th encrypted result of NAS key pair is decrypted, and obtains the second decrypted result;
If it is identical with second decrypted result that the UE is also used to first decrypted result, it is determined that described LTE-U network is verified.
In conclusion in embodiments of the present invention, for the UE of non-access carrier network, when UE access LTE-U net When network, the first attach request can be sent to the MME of LTE-U network, when the MME of LTE-U network receives first attachment When request, the network identity of the LTE-U network can be added in the first attach request, so that the second attach request is generated, and Second attach request is sent to the MME of LTE network, the MME of LTE network is based on second attach request and generates authorization data Request, when HSS receives authorization data request, generates mirror based on authorization data request to request authentication vector to HSS Weight vector, and the authentication vector is sent to the MME of LTE network, later, the MME of LTE network can be according to receiving Authentication vector and the MME of UE and LTE-U network are interacted, to realize network authentication.It that is to say, through the embodiment of the present invention The network authentication method of offer, UE can be in access carrier networks and LTE-U network, disposable completion and carrier network Authentication between LTE-U network is user to allow UE while smoothly access carrier network and LTE-U network Use bring conveniently.
It should be understood that network authentication system provided by the above embodiment is when carrying out network authentication, only with above-mentioned each The division progress of functional module can according to need and for example, in practical application by above-mentioned function distribution by different function Energy module is completed, i.e., the internal structure of equipment is divided into different functional modules, to complete whole described above or portion Divide function.In addition, network authentication system provided by the above embodiment and network authentication embodiment of the method belong to same design, have Body realizes that process is detailed in embodiment of the method, and which is not described herein again.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.It is all or part of when loading on computers and executing the computer instruction Ground is generated according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, Computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or Person is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction Can from a web-site, computer, server or data center by it is wired (such as: coaxial cable, optical fiber, data use Family line (Digital Subscriber Line, DSL)) or wireless (such as: infrared, wireless, microwave etc.) mode to another net Website, computer, server or data center are transmitted.The computer readable storage medium can be computer can Any usable medium of access either includes the data storage such as one or more usable mediums integrated server, data center Equipment.The usable medium can be magnetic medium (such as: floppy disk, hard disk, tape), optical medium (such as: digital versatile disc (Digital Versatile Disc, DVD)) or semiconductor medium (such as: solid state hard disk (Solid State Disk, SSD)) etc..
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is embodiment provided by the present application, all in spirit herein and original not to limit the application Within then, any modification, equivalent replacement, improvement and so on be should be included within the scope of protection of this application.

Claims (24)

1. a kind of network authentication method, which is characterized in that the described method includes:
When the mobile management entity MME of the unlicensed LTE-U network based on long term evolution receives from user equipment (UE) When one attach request, the network identity of the LTE-U network is added in first attach request, is asked with generating the second attachment It asks, and second attach request is sent to the MME of long term evolution LTE network;
When the MME of the LTE network receives second attach request, it is based on second attach request, is signed to ownership About client server HSS sends authorization data request, and the network identity of the LTE-U network is carried in the authorization data request With the network identity of the LTE network;
When the HSS receives authorization data request, network identity and the LTE net based on the LTE-U network The network identity of network generates authentication vector, and sends the authentication vector, the authentication vector packet to the MME of the LTE network Include the parameter for being authenticated to the UE, the LTE-U network and the LTE network;
When the MME of the LTE network receives the authentication vector, based on the authentication vector and the UE and described The MME of LTE-U network is interacted, to realize network authentication.
2. the method as described in claim 1, which is characterized in that the authentication vector includes first foundation key, expectation reply Information, the first random number and authentication signature AUTN, the first foundation key are the corresponding key of the LTE-U network;
It is described to be interacted based on the authentication vector and the MME of the UE and the LTE-U network, to realize that network reflects Power, comprising:
The MME of the LTE network stores the expectation return information, and is sent by the MME of the LTE-U network to the UE First random number, the AUTN, the network identity of the LTE-U network and the first encrypted result, the first encryption knot Fruit is generated by the MME of the LTE-U network based on the first foundation key;
Add when the UE receives first random number, the AUTN, the network identity of the LTE-U network and described first When close result, the LTE network is verified based on first random number and the AUTN, and random based on described first Several, the described AUTN, the network identity of the LTE-U network and first encrypted result verify the LTE-U network;
When the UE, which is determined, to be verified to the LTE network and the LTE-U network, return information is generated, and be based on The network identity of first random number, the AUTN and the LTE-U network generates the second encrypted result;
Second encrypted result is sent to the MME of the LTE-U network by the UE, and the return information is sent to The MME of LTE network;
When the MME of the LTE-U network receives second encrypted result, based on second encrypted result to the UE It is verified, when the MME of the LTE network receives the return information, is based on the expectation return information and described time Complex information verifies the UE.
3. method according to claim 2, which is characterized in that the MME of the LTE network passes through the MME of the LTE-U network First random number, the AUTN and the first encrypted result are sent to the UE, comprising:
The MME of the LTE network stores the expectation return information, and by the first foundation key, described first Random number and the AUTN are sent to the MME of the LTE-U network;
It, will when the MME of the LTE-U network receives the first foundation key, first random number and the AUTN The first foundation key is stored, based on the first foundation key generate the first encrypted result, and by described first with Machine number, the AUTN, the network identity of the LTE-U network and first encrypted result are sent to the UE.
4. method as claimed in claim 3, which is characterized in that described to generate the first encryption knot based on the first foundation key Fruit, comprising:
The MME of the LTE-U network generates the second random number, and by the second random number described in the first foundation key pair into Row encryption, obtains first encrypted result;
Correspondingly, described to add first random number, the AUTN, the network identity of the LTE-U network and described first Close result is sent to the UE, comprising:
The MME of the LTE-U network by first random number, the AUTN, the LTE-U network network identity, described First encrypted result and second random number are sent to the UE.
5. the method as claimed in claim 3 or 4, which is characterized in that the AUTN includes message authentication code MAC;
The UE is based on first random number and the AUTN verifies the LTE network, comprising:
The UE generates expectation message mirror based on the other parameters in first random number and the AUTN in addition to the MAC Weighted code XMAC;
If the XMAC is identical with the MAC, the UE determination is verified the LTE network.
6. method as claimed in claim 4, which is characterized in that the UE is based on the first random number, AUTN, described The network identity of LTE-U network and first encrypted result verify the LTE-U network, comprising:
The UE is close according to the second basis of the network identity of the LTE-U network, first random number and the AUTN generation Key;
The UE encrypts second random number by second foundation key, obtains third encrypted result;
If first encrypted result is equal to the third encrypted result, the LTE-U network is tested in the UE determination Card passes through.
7. method as claimed in claim 6, which is characterized in that described based on first random number, the AUTN and described The network identity of LTE-U network generates the second encrypted result, comprising:
The UE generates third random number, and random to second random number and the third by second foundation key Number carries out whole encryption, obtains the second encrypted result;
Correspondingly, second encrypted result is sent to the MME of the LTE-U network by the UE, comprising:
Second encrypted result and the third random number are sent to the MME of the LTE-U network by the UE;
Correspondingly, the MME of the LTE-U network verifies the UE based on second encrypted result, comprising:
Second random number and the third described in the first foundation key pair of the MME of the LTE-U network by storage with Machine number carries out whole encryption, obtains the 4th encrypted result;
If second encrypted result and the 4th encrypted result are equal, the MME of the LTE-U network is determined to described UE's is verified.
8. method according to claim 2, which is characterized in that the MME of the LTE network passes through the MME of the LTE-U network First random number, the AUTN, the network identity of the LTE-U network and the first encrypted result are sent to the UE, is wrapped It includes:
The MME of the LTE network stores the expectation return information, and by the first foundation key, the expectation Return information, first random number and the AUTN are sent to the MME of the LTE-U network;
When the MME of the LTE-U network receives the first foundation key, the expectation return information, described first at random When the several and AUTN, the first foundation key and the expectation return information are stored, are based on the first foundation Key generates the first encrypted result, and by first random number, the AUTN, the network identity of the LTE-U network and institute It states the first encrypted result and is sent to the UE.
9. method according to claim 8, which is characterized in that the AUTN includes MAC;
It is described that first encrypted result is generated based on the first foundation key, comprising:
The MME of the LTE-U network is encrypted by MAC described in the first foundation key pair, obtains first encryption As a result.
10. method as claimed in claim 9, which is characterized in that the UE is based on first random number, the AUTN, institute The network identity and first encrypted result for stating LTE-U network verify the LTE-U network, comprising:
The UE is close according to the second basis of the network identity of the LTE-U network, first random number and the AUTN generation Key;
The UE encrypts the MAC by second foundation key, obtains the 5th encrypted result;
If first encrypted result be equal to the 5th encryption as a result, if the UE determination LTE-U network is tested Card passes through.
11. method as claimed in claim 10, which is characterized in that described to be based on first random number, the AUTN and institute The network identity for stating LTE-U network generates the second encrypted result, comprising:
The UE encrypts the return information by second foundation key, obtains the second encrypted result;
Correspondingly, the MME of the LTE-U network verifies the UE based on second encrypted result, comprising:
Return information encryption described in the first foundation key pair of the MME of the LTE-U network by storage, obtains the 6th and adds Close result;
If the expectation return information that the MME of the LTE-U network is stored is identical as the return information, and the described 6th Encrypted result is equal with second encrypted result, then the MME determination of the LTE-U network is verified the UE.
12. the method as described in claim 1, which is characterized in that the safety for carrying the UE in second attach request is calculated Method, the authentication vector include third foundation key, expectation return information, the first random number, authentication signature AUTN, the third Foundation key is the corresponding key of the LTE network;
It is described to be interacted based on the authentication vector and the MME of the UE and the LTE-U network, to realize that network reflects Power, comprising:
The MME of the LTE network is based on the third foundation key, the expectation return information, first random number and institute It states the AUTN and UE to interact, to realize the UE to MME pairs of the verifying of the LTE network and the LTE network The verifying of the UE;
When being verified, the second random number is generated, and be based on the LTE-U to the UE when the MME of the LTE network is determining The network identity of network and the third foundation key generate first foundation key;
The MME of the LTE network generates Non-Access Stratum NAS key based on the security algorithm of the UE, and passes through the NAS key Second random number is encrypted, the 7th encrypted result is obtained;
The MME of the LTE network is by the first foundation key, the third foundation key, the NAS key, the LTE-U The network identity of network, second random number and the 7th encrypted result are sent to the MME of the LTE-U network;
The MME of the LTE-U network is encrypted by the second random number described in the first foundation key pair, is obtained the 8th and is added It is close as a result, and by the third foundation key, the NAS key, the LTE-U network network identity, it is described 7th encryption As a result the UE is sent to the 8th encrypted result;
The UE generates the second foundation key based on the network identity of the third foundation key and the LTE-U network, and leads to It crosses second foundation key the 8th encrypted result is decrypted, obtains the first decrypted result, pass through the NAS key 7th encrypted result is decrypted, the second decrypted result is obtained;
If first decrypted result is identical with second decrypted result, the UE is determined to the LTE-U network It is verified.
13. a kind of network authentication system, which is characterized in that the system comprises:
The mobile management entity MME of unlicensed LTE-U network based on long term evolution is received for working as from user equipment (UE) The first attach request when, the network identity of the LTE-U network is added in first attach request, it is second attached to generate Request, and second attach request is sent to the MME of long term evolution LTE network;
The MME of the LTE network, for when it is described receive second attach request when, be based on second attach request, Authorization data request is sent to home signature user server HSS, carries the LTE-U network in the authorization data request The network identity of network identity and the LTE network;
The HSS, for when receiving authorization data request, network identity based on the LTE-U network and described The network identity of LTE network generates authentication vector, and sends the authentication vector, the authentication to the MME of the LTE network Vector includes the parameter for being authenticated to the UE, the LTE-U network and the LTE network;
The MME of the LTE network, for when receiving the authentication vector, based on the authentication vector and the UE and The MME of the LTE-U network is interacted, to realize network authentication.
14. system as claimed in claim 13, which is characterized in that the authentication vector includes first foundation key, it is expected back Complex information, the first random number and authentication signature AUTN, the first foundation key are the corresponding key of the LTE-U network;
The MME of the LTE network is specifically used for storing the expectation return information, and by the MME of the LTE-U network to institute It states UE and sends first random number, the AUTN, the network identity of the LTE-U network and the first encrypted result, described One encrypted result is generated by the MME of the LTE-U network based on the first foundation key;
The UE is used for when receiving first random number, the AUTN, the network identity of the LTE-U network and described the When one encrypted result, the LTE network is verified based on first random number and the AUTN, and is based on described first Random number, the AUTN, the network identity of the LTE-U network and first encrypted result carry out the LTE-U network Verifying;
The UE is also used to generate return information when determination is verified the LTE network and the LTE-U network, And the second encrypted result is generated based on the network identity of first random number, the AUTN and the LTE-U network;
The UE is also used to for second encrypted result being sent to the MME of the LTE-U network, and the return information is sent out It send to the MME of LTE network;
The MME of the LTE-U network is used for when receiving second encrypted result, based on second encrypted result to institute It states UE to be verified, when the MME of the LTE network receives the return information, is based on the expectation return information and institute Return information is stated to verify the UE.
15. system as claimed in claim 14, which is characterized in that the MME of the LTE network is specifically used for:
The expectation return information is stored, and by the first foundation key, first random number and the AUTN It is sent to the MME of the LTE-U network;
The MME of the LTE-U network, which is also used to work as, receives the first foundation key, first random number and the AUTN When, the first foundation key is stored, the first encrypted result is generated based on the first foundation key, and by described the One random number, the AUTN, the network identity of the LTE-U network and first encrypted result are sent to the UE.
16. system as claimed in claim 15, which is characterized in that the MME of the LTE-U network is specifically used for:
The second random number is generated, and is encrypted by the second random number described in the first foundation key pair, obtains described One encrypted result;
By first random number, the AUTN, the network identity of the LTE-U network, first encrypted result and described Second random number is sent to the UE.
17. the system as described in claim 15 or 16, which is characterized in that the AUTN includes message authentication code MAC;
The UE is specifically used for:
Expectation message authentication code is generated based on the other parameters in first random number and the AUTN in addition to the MAC XMAC;
It is described that the LTE network is verified if the XMAC is identical with the MAC.
18. system as claimed in claim 16, which is characterized in that the UE is specifically used for:
The second foundation key is generated according to the network identity of the LTE-U network, first random number and the AUTN;
Second random number is encrypted by second foundation key, obtains third encrypted result;
If first encrypted result is equal to the third encrypted result, it is determined that be verified to the LTE-U network.
19. system as claimed in claim 18, which is characterized in that the UE is specifically used for:
Third random number is generated, and second random number and the third random number are carried out by second foundation key Whole encryption, obtains the second encrypted result;
Second encrypted result and the third random number are sent to the MME of the LTE-U network;
Correspondingly, the MME of the LTE-U network is specifically used for:
Second random number described in the first foundation key pair by storage and the third random number carry out whole encryption, obtain To the 4th encrypted result;
If second encrypted result and the 4th encrypted result are equal, it is determined that be verified to the UE.
20. system as claimed in claim 14, which is characterized in that the MME of the LTE network is specifically used for:
The expectation return information is stored, and by the first foundation key, the expectation return information, described first Random number and the AUTN are sent to the MME of the LTE-U network;
The MME of the LTE-U network, which is used to work as, receives the first foundation key, the expectation return information, described first Random number and when the AUTN, the first foundation key and the expectation return information are stored, are based on described first Foundation key generate the first encrypted result, and by first random number, the AUTN, the LTE-U network network identity The UE is sent to first encrypted result.
21. system as claimed in claim 20, which is characterized in that the AUTN includes MAC;
The MME of the LTE-U network is specifically used for:
It is encrypted by MAC described in the first foundation key pair, obtains first encrypted result.
22. system as claimed in claim 21, which is characterized in that the UE is specifically used for:
The second foundation key is generated according to the network identity of the LTE-U network, first random number and the AUTN;
The MAC is encrypted by second foundation key, obtains the 5th encrypted result;
If first encrypted result be equal to it is described 5th encryption as a result, if determination the LTE-U network is verified.
23. the system as claimed in claim 22, which is characterized in that the UE is specifically used for:
The return information is encrypted by second foundation key, obtains the second encrypted result;
Correspondingly, the MME of the LTE-U network is specifically used for:
The encryption of return information described in the first foundation key pair by storage, obtains the 6th encrypted result;
If the expectation return information that the MME of the LTE-U network is stored is identical as the return information, and the described 6th Encrypted result is equal with second encrypted result, it is determined that is verified to the UE.
24. system as claimed in claim 13, which is characterized in that the safety for carrying the UE in second attach request is calculated Method, the authentication vector include third foundation key, expectation return information, the first random number, authentication signature AUTN, the third Foundation key is the corresponding key of the LTE network;
The MME of the LTE network is specifically used for, based on the third foundation key, the expectation return information, described first with Machine number and the AUTN and UE are interacted, to realize verifying and the LTE net of the UE to the LTE network Verifying of the MME of network to the UE;
The MME of the LTE network is also used to generate the second random number, and be based on institute when determining to the UE when being verified The network identity and the third foundation key of LTE-U network are stated, first foundation key is generated;
The MME of the LTE network is also used to the security algorithm based on the UE and generates Non-Access Stratum NAS key, and by described Second random number described in NAS key pair is encrypted, and the 7th encrypted result is obtained;
The MME of the LTE network is also used to the first foundation key, the third foundation key, the NAS key, institute Network identity, second random number and the 7th encrypted result for stating LTE-U network are sent to the LTE-U network MME;
The MME of the LTE-U network is specifically used for being encrypted by the second random number described in the first foundation key pair, obtains To the 8th encrypted result, and by the third foundation key, the NAS key, the LTE-U network network identity, described 7th encrypted result and the 8th encrypted result are sent to the UE;
The UE is specifically used for close based on the second basis of the network identity of the third foundation key and LTE-U network generation Key, and the 8th encrypted result is decrypted by second foundation key, the first decrypted result is obtained, by described The 7th encrypted result of NAS key pair is decrypted, and obtains the second decrypted result;
If it is identical with second decrypted result that the UE is also used to first decrypted result, it is determined that the LTE-U Network is verified.
CN201710510229.3A 2017-06-28 2017-06-28 Network authentication method and system Expired - Fee Related CN109151816B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710510229.3A CN109151816B (en) 2017-06-28 2017-06-28 Network authentication method and system
PCT/CN2018/093319 WO2019001509A1 (en) 2017-06-28 2018-06-28 Network authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710510229.3A CN109151816B (en) 2017-06-28 2017-06-28 Network authentication method and system

Publications (2)

Publication Number Publication Date
CN109151816A true CN109151816A (en) 2019-01-04
CN109151816B CN109151816B (en) 2020-08-07

Family

ID=64741115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710510229.3A Expired - Fee Related CN109151816B (en) 2017-06-28 2017-06-28 Network authentication method and system

Country Status (2)

Country Link
CN (1) CN109151816B (en)
WO (1) WO2019001509A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150281966A1 (en) * 2014-03-28 2015-10-01 Qualcomm Incorporated Provisioning credentials in wireless communications
WO2016074707A1 (en) * 2014-11-12 2016-05-19 Nokia Solutions And Networks Oy Method, apparatus and system
WO2016136647A1 (en) * 2015-02-25 2016-09-01 京セラ株式会社 Network device and user terminal
CN106465242A (en) * 2014-05-06 2017-02-22 高通股份有限公司 Techniques for network selection in unlicensed frequency bands
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106455065A (en) * 2015-08-06 2017-02-22 阿尔卡特朗讯 Method and device to control the use of unauthorized frequency band
CN106888482B (en) * 2015-12-15 2020-04-07 展讯通信(上海)有限公司 Terminal, LTE-U base station and communication method thereof
CN106851662B (en) * 2017-01-18 2019-11-19 京信通信***(中国)有限公司 A kind of unlicensed spectrum resource allocation methods and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150281966A1 (en) * 2014-03-28 2015-10-01 Qualcomm Incorporated Provisioning credentials in wireless communications
CN106465242A (en) * 2014-05-06 2017-02-22 高通股份有限公司 Techniques for network selection in unlicensed frequency bands
WO2016074707A1 (en) * 2014-11-12 2016-05-19 Nokia Solutions And Networks Oy Method, apparatus and system
WO2016136647A1 (en) * 2015-02-25 2016-09-01 京セラ株式会社 Network device and user terminal
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal

Also Published As

Publication number Publication date
WO2019001509A1 (en) 2019-01-03
CN109151816B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
US20220407713A1 (en) Secure token refresh
KR101648158B1 (en) Wireless communication using concurrent re-authentication and connection setup
US10904753B2 (en) Systems and methods for authentication
Jiang et al. EAP-based group authentication and key agreement protocol for machine-type communications
CN107005569A (en) Peer-to-peer services layer certification
EP3657835A1 (en) Access method of user equipment and user equipment
EP3223452A1 (en) Method and apparatus for providing service on basis of identifier of user equipment
CN112512045B (en) Communication system, method and device
CN109922462A (en) Machine To Machine ROM BOOT
EP3956792B1 (en) Cryptographic key generation for mobile communications device
EP4231680A1 (en) Identity authentication system, method and apparatus, device, and computer readable storage medium
CN103188229A (en) Method and equipment for secure content access
CN109314693A (en) The method and apparatus of authentication secret requesting party
US20230308875A1 (en) Wi-fi security authentication method and communication apparatus
WO2023083170A1 (en) Key generation method and apparatus, terminal device, and server
CN102932787A (en) Service test system for extensible authentication protocol (EAP)-subscriber identity module (SIM) user authentication
CN113543121A (en) Protection method for updating terminal parameter and communication device
CN108616350A (en) A kind of HTTP-Digest class AKA identity authorization systems and method based on pool of symmetric keys
CN114205072B (en) Authentication method, device and system
Miller et al. The 5g key-establishment stack: In-depth formal verification and experimentation
CN103781026A (en) Authentication method of general authentication mechanism
JP2023519997A (en) Method and communication apparatus for securing terminal parameter updates
US20220174490A1 (en) System, method, storage medium and equipment for mobile network access
CN109151816A (en) A kind of network authentication method and system
CN113039766B (en) Optimized equivalent Simultaneous Authentication (SAE) authentication in wireless networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200807

Termination date: 20210628

CF01 Termination of patent right due to non-payment of annual fee