WO2010037299A1 - 一种保护用户终端能力的方法、装置 - Google Patents

一种保护用户终端能力的方法、装置 Download PDF

Info

Publication number
WO2010037299A1
WO2010037299A1 PCT/CN2009/073775 CN2009073775W WO2010037299A1 WO 2010037299 A1 WO2010037299 A1 WO 2010037299A1 CN 2009073775 W CN2009073775 W CN 2009073775W WO 2010037299 A1 WO2010037299 A1 WO 2010037299A1
Authority
WO
WIPO (PCT)
Prior art keywords
user terminal
capability information
security
verification
network side
Prior art date
Application number
PCT/CN2009/073775
Other languages
English (en)
French (fr)
Inventor
陈璟
黄敏
张爱琴
刘晓寒
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010037299A1 publication Critical patent/WO2010037299A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to network security technologies.
  • the Universal Terrestrial Radio Access Network includes one or several Radio Network Subsystems (RNS).
  • RNS consists of a Radio Network Controller (RNC) and one or more base stations (NodeBs).
  • RNC Radio Network Controller
  • NodeBs base stations
  • Evolved UTRAN Evolved UTRAN
  • eNB EUTRAN NodeB, evolved base station
  • the eNB exchanges data and signaling through the X2 interface
  • the eNB connects to evolve the packet core through the S1 interface (EPC, Evolved Packet) Core)
  • EPC Evolved Packet
  • MME Mobility Management Entity
  • security protection can be divided into application server layer (AS, Application Server) security protection and non-access layer (NAS, Non Acces s Strat leg) security protection.
  • AS application server layer
  • NAS Non Acces s Strat leg
  • the AS layer mainly protects between user terminals and eNBs.
  • the NAS layer mainly protects the NAS signaling between the user terminal and the MME.
  • the security mode startup includes the security mode startup of the AS layer and the security mode startup of the NAS layer. Before the security mode is started, the data and signaling are not protected. The security mode is started after the security mode is successfully started. .
  • the eNB is based on the eNB. The known user terminal capability determines the security protection to be used between the user terminal and the eNB.
  • the AS algorithm and notifies the user terminal through the security mode command.
  • the AS layer security mode command carries the key identifier KSI asme (KSI asme , Key Set Indentifier) and the RRC encryption algorithm EPS AS layer signaling encryption algorithm selected by the eNB according to the user terminal capability and the eNB's own algorithm support capability (EAEA, EPS AS Encryption).
  • Algorithm EPS AS layer signaling integrity protection algorithm
  • EAIA EPS AS Integrity Algorithm
  • EUEA EPS User-plan Encryption Algorithm
  • AS-MAC AS-MAC with integrity protection.
  • the security mode command carries the key identifier KS I asme and the carrier eNB finally selects according to the capability of the user terminal and the support capability of the solid E algorithm.
  • EPEA EPS NAS Encryption Algorithm
  • EPIA EPS NAS Integrity Algorithm
  • NAS-MAC with integrity protection.
  • the capabilities of the user terminal can be divided into UE Radio Capability and UE Network Capability.
  • the user terminal capabilities on the eNB include air interface security capabilities and other wireless transmission aspects.
  • the capability of the air interface (such as the supported antenna parameters), wherein the air interface security capability includes the algorithm supported by the user terminal for the AS security layer;
  • the network capability of the user terminal includes the security capability of the user terminal at the NAS layer, wherein the user terminal is at the NAS layer.
  • the security capabilities are reflected in the NAS security algorithms supported by the NAS layer.
  • the MME when there is no user terminal capability information at the MN, the MME sends an initial context request message to the eNB, and the context request message is used. Obtaining the air interface capability of the user terminal, after the eNB receives the initial context request message, if the eNB does not have the user terminal air interface capability information, the eNB cannot select the AS layer algorithm in the AS security protection. At this time, the eNB needs to send the capability query to the user terminal. The request message is used to request the user terminal capability information, and the user terminal returns the capability information to the eNB.
  • the security mode is started after the security mode is successfully started.
  • the security mode of the AS layer is not started yet.
  • the capability information returned by the message and the user terminal is not securely protected, which may result in a security risk, and the true reliability of the user terminal capability information stored on the network side cannot be guaranteed.
  • the main technical problem to be solved by the embodiments of the present invention is to provide a method and a device for protecting the capability of a user terminal, so that the capability information of the user terminal obtained by the network side is securely protected, and the user terminal capability information stored on the network side is guaranteed to be authentic and reliable. Sex.
  • an embodiment of the present invention provides a method for protecting a user terminal capability, including:
  • the network side requests the capability information of the user terminal to the user terminal;
  • the embodiment of the invention provides a method for protecting the capability of a user terminal, including:
  • the user terminal receives the user terminal capability query request sent by the network side, and sends the user terminal capability information to the network side;
  • the user terminal After receiving the security verification command sent by the network side, the user terminal performs a security verification process to the network side.
  • the embodiment of the invention provides a method for protecting the capability of a user terminal, including:
  • the NAS security algorithm capability information of the user terminal is substituted for the AS security algorithm capability information of the user terminal, and the verification process is initiated.
  • the embodiment of the invention provides a network side device, including:
  • a sending module configured to send, to the user terminal, a capability information request for acquiring the user terminal, and a receiving module, configured to: after the sending module sends the request message, receive the capability information returned by the user terminal;
  • a verification module configured to initiate a security verification process to the user terminal according to the received user terminal capability information.
  • An embodiment of the present invention provides a device on a user terminal side, including: a receiving module, configured to receive a user terminal capability query request sent by the network side, and a sending module, configured to: after receiving the user terminal capability query request, the receiving module sends the capability information of the user terminal to the network side;
  • the verification module is configured to perform a security verification process on the network side after receiving the security verification command sent by the network side; the security verification command carries the capability information of the user terminal received by the network side.
  • An embodiment of the present invention provides a device on a user terminal side, including:
  • a receiving module configured to receive a request message that carries the NAS security algorithm capability information sent by the MN; the verification module is configured to: after the receiving module receives the request message, replace the NAS security algorithm capability information of the user terminal with the AS security algorithm capability information of the user terminal. And initiate the verification process.
  • the network side requests the user terminal for the capability information of the user terminal, and after receiving the capability information returned by the user terminal, the network side initiates a security verification process to the user terminal, and obtains the security verification process.
  • the capability information of the user terminal is protected, and the true reliability of the user terminal capability stored on the network side is ensured.
  • FIG. 1 is a flowchart of Embodiment 1 of a method for protecting a user terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of Embodiment 2 of a method for protecting a user terminal according to an embodiment of the present invention
  • FIG. 3 is a protection user according to an embodiment of the present invention
  • FIG. 4 is a flowchart of Embodiment 4 of a method for protecting a user terminal according to an embodiment of the present invention
  • FIG. 5 is a flowchart of Embodiment 5 of a method for protecting a user terminal according to an embodiment of the present invention
  • FIG. 6 is a flowchart of Embodiment 6 of a method for protecting a user terminal according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of a network side device according to an embodiment of the present invention
  • FIG. 9 is a schematic diagram of another network side device according to an embodiment of the present
  • the embodiment of the invention provides a method for protecting the capability of the user terminal. As shown in FIG. 1 , the method for protecting the capability of the user terminal provided by the first embodiment of the present invention includes the following steps:
  • the network side requests the capability information of the user terminal to the user terminal.
  • the network side After receiving the capability information returned by the user terminal, the network side initiates a security verification process to the user terminal.
  • the embodiment of the present invention further provides a method for protecting the capability of the user terminal.
  • the method for protecting the capability of the user terminal provided by the second embodiment of the present invention includes the following steps:
  • the user terminal receives the user terminal capability query request sent by the network side, and sends the capability information of the user terminal to the network side.
  • the user terminal After receiving the security verification command sent by the network side, the user terminal performs a security verification process on the network side.
  • the network side requests the user terminal for the capability information of the user terminal, and after receiving the capability information returned by the user terminal, the network side initiates a security verification process to the user terminal, and obtains the security verification process.
  • the capability information of the user terminal is protected, and the true reliability of the user terminal capability stored on the network side is ensured.
  • FIG. 3 is a schematic flowchart of a method for protecting a user terminal capability according to Embodiment 3 of the present invention.
  • the method is a solution for starting an AS security mode command to protect user terminal capability information, and includes the following steps:
  • MN sends an initial context request to the eNB
  • the eNB When the eNB does not have the capability information of the user terminal, the eNB sends a capability query request to the user terminal.
  • the user terminal After receiving the capability query request, the user terminal sends the capability information of the user terminal or the capability information summary of the user terminal to the eNB.
  • the eNB After receiving the capability information of the user terminal sent by the user terminal or the capability information summary of the user terminal, the eNB obtains the capability information of the user terminal or the capability information of the user terminal by AS security of integrity protection. a mode command is sent to the user terminal;
  • the user terminal receives an integrity-protected AS security mode command, where the AS security mode command carries the capability information of the user terminal or the capability information summary of the user terminal, and the user terminal determines the capability information or the capability information summary and the AS. Whether the capability information of the user terminal carried in the security mode command or the capability information summary of the user terminal is consistent.
  • step 305a If they are consistent, go to step 305a. If they are inconsistent, go to step 305b.
  • the user terminal begins to verify the integrity of the AS security mode command. When the integrity verification is successful, the user terminal returns an AS security mode command completion message to the eNB.
  • the user terminal relinquishes the integrity verification of the security mode command, and the user terminal sends a security mode failure message to the eNB, or prohibits feedback to the network side.
  • the eNB determines whether the capability of the user terminal is verified.
  • the eNB determines that the user terminal capability passes the verification, and proceeds to step 307.
  • the eNB determines that the user terminal capability does not pass the authentication, and the eNB releases the RRC connection or selects the retransmission security mode. command.
  • the eNB does not receive the feedback of the user terminal within a predetermined time.
  • the specific implementation may be: The eNB may set a timer, and when the eNB obtains the user terminal capability information or the user terminal capability information digest, and sends the integrity protection by sending After the AS security mode command sends the information to the user terminal, the timer is started, if the user terminal determines the capability information or the capability information digest and the user terminal capability information carried by the AS security mode command or the user terminal capability information summary.
  • the user terminal If the user terminal is inconsistent, the user terminal relinquishes the integrity verification of the security mode command, that is, the eNB does not receive the feedback of the user terminal within a predetermined time, that is, the timer expires, and the eNB releases the RRC connection or selects to resend the security mode command.
  • the eNB sends a context response message to the MME, where the context response message carries capability information of the user terminal.
  • the network side requests the user terminal for the capability information of the user terminal, and after receiving the capability information returned by the user terminal, the network side initiates a security verification process to the user terminal, and obtains the security verification process.
  • the capability information of the user terminal is protected, and the true reliability of the user terminal capability stored on the network side is ensured.
  • FIG. 4 is a schematic flowchart of a method for protecting a user terminal capability according to Embodiment 4 of the present invention, where the method is to start the NAS security mode command to carry the capability information of the user terminal, and the user terminal side protects the user terminal capability information.
  • the solution includes the following steps:
  • the MME sends an initial context request to the eNB.
  • the eNB When the eNB does not have the capability information of the user terminal, the eNB sends a capability query request to the user terminal.
  • the user terminal After receiving the capability query request, the user terminal sends all the user terminal capability information or a part of the user terminal capability information or the user terminal capability information summary to the eNB.
  • the eNB sends all the received user terminal capability information or a part of the user terminal capability information or the user terminal capability information digest to the MME by using a context response message.
  • the capability information of the user terminal is obtained. All or part of the user terminal capability information or the user terminal capability information digest is sent to the user terminal through an integrity protected NAS security mode command.
  • the user terminal receives an integrity-protected NAS security mode command, where the NAS security mode command carries all of the user terminal capability information or a part of the user terminal capability information or the user terminal capability information digest, and the user terminal determines itself. All of the capability information or a part of the capability information or the capability information digest is consistent with all of the user terminal capability information carried by the NAS security mode command or a part of the user terminal capability or the user terminal capability information digest. If they are consistent, go to step 407a. If they are not consistent, go to step 407b.
  • the user terminal starts to verify the integrity of the NAS security mode command. When the integrity verification succeeds, the user terminal returns a NAS security mode command completion message to the UE.
  • the user terminal relinquishes the integrity verification of the security mode command.
  • the user terminal sends a message that the security mode fails to the MME, or prohibits the feedback to the MME.
  • the E is received by the NAS security mode completion command, the user terminal capability is verified.
  • ⁇ E If the NAS security mode failure message sent by the user terminal is received or the feedback of the user terminal is not received within a predetermined time, then ⁇ E determines that the user terminal capability has not passed the verification, and the EI releases the RRC connection or selects the weight. Pass the security mode command.
  • the MN does not receive the feedback from the user terminal within a predetermined time.
  • the specific implementation may be: ⁇ E may also set a timer, and ⁇ E obtains all of the user terminal capability information or a part of the user terminal capability information or The user terminal capability information summary, and after the information obtained by the integrity-protected NAS security mode command is sent to the user terminal, the timer is started; if the user terminal determines all of the capability information or part of the capability information Or the user terminal abandons the completeness of the security mode command when the capability information digest and the integrity-protected NAS security mode command carry all of the user terminal capability information or a part of the user terminal capability information or the user terminal capability information digest is inconsistent. Sexual verification, feedback to the MME is prohibited.
  • ⁇ E does not receive feedback from the user terminal at a predetermined time, that is, the timer expires, and the MME releases the RRC connection or selects to resend the security mode command.
  • the network side requests the user terminal for the capability information of the user terminal, and after receiving the capability information returned by the user terminal, the network side initiates a security verification process to the user terminal, and obtains the security verification process.
  • the capability information of the user terminal is protected, and the true reliability of the user terminal capability stored on the network side is ensured.
  • the embodiment of the present invention further provides a method for protecting the capability of the user terminal.
  • the method for protecting the capability of the user terminal provided by the fifth embodiment of the present invention includes the following steps:
  • the eNB receives the request message that carries the NAS security algorithm capability information sent by the MME.
  • the eNB replaces the NAS security algorithm capability information of the user terminal with the AS security algorithm capability information of the user terminal, and initiates a verification process.
  • the eNB initiates an authentication process to the UE according to the received NAS security algorithm capability information of the UE that is sent by the solid E, and protects the obtained capability information of the user terminal through the security verification process, thereby ensuring network side storage.
  • the true reliability of the user terminal capabilities is not limited to the Bluetooth Special Interest Group (SIG)
  • the eNB initiates an authentication process to the UE according to the received NAS security algorithm capability information of the UE that is sent by the solid E, and protects the obtained capability information of the user terminal through the security verification process, thereby ensuring network side storage. The true reliability of the user terminal capabilities.
  • FIG. 6 is a schematic flowchart of a method for protecting a user terminal capability according to Embodiment 6 of the present invention, where the eNB does not have the AS layer security algorithm capability of the user terminal, and refers to the user terminal NAS security algorithm capability information.
  • the AS layer security protection algorithm including the following steps:
  • the eNB receives an initialization context request message sent by the MME, where the message carries the NAS security algorithm capability information of the user terminal.
  • the circle E sends an initialization context request message carrying the NAS security algorithm capability information of the user terminal to the eNB;
  • the eNB After receiving the initialization context request message sent by the MME, the eNB obtains the NAS security algorithm capability information of the user terminal that is carried by the eNB, and when the eNB does not have the air interface capability information (including the AS security algorithm capability information) of the user terminal. The eNB selects the AS security algorithm capability information of the user terminal by referring to the NAS security algorithm capability information of the user terminal;
  • the eNB will select an AS layer security protection algorithm with reference to the NAS security algorithm capability information, including selection.
  • RRC encryption algorithm EAEA RRC integrity protection algorithm
  • EAIA user plane encryption algorithm
  • EUEA user plane encryption algorithm
  • the eNB sends an AS security mode command to the user terminal.
  • the eNB includes the AS layer security protection algorithm selected by the eNB in the foregoing step 602, including the RRC encryption algorithm EAEA, the RRC integrity protection algorithm EAIA, and the user plane encryption algorithm EUEA in the AS security mode command message, and sends the information to the user terminal.
  • the AS layer security protection algorithm selected by the eNB in the foregoing step 602 including the RRC encryption algorithm EAEA, the RRC integrity protection algorithm EAIA, and the user plane encryption algorithm EUEA in the AS security mode command message, and sends the information to the user terminal.
  • the user terminal verifies the integrity of the AS security mode command according to the received algorithm of the AS security mode command.
  • step 605a if the user terminal successfully authenticates the integrity protection of the AS security mode command, returning the AS security mode command completion message, and after starting the AS security mode, performing step 606;
  • step 605b if the user terminal fails to verify the integrity protection command of the AS security mode command, the user terminal sends a message that the security mode fails to the eNB, and then performs step 605c;
  • the eNB After receiving the message that the security mode fails, the eNB releases the RRC connection, or selects a retransmission security mode command.
  • the eNB sends a capability query request to the user terminal, where the message has security protection.
  • the user terminal sends capability information of the user terminal with security protection to the eNB.
  • the eNB sends the user terminal capability message with security protection to the MME through a context response message.
  • the eNB may also set a timer on the eNB. After the eNB includes the NAS security algorithm capability information in the AS security mode command, and sends the data to the user terminal. The eNB may select to resend the security mode command when the eNB fails to timeout and the security mode fails to be received before the timer expires on the eNB. When the device times out but does not receive the message that the security mode fails, the eNB releases the RRC connection or selects the retransmission security mode command.
  • FIG. 7 is a diagram of a network side device according to an embodiment of the present invention, including a sending module 701, configured to send, to a user terminal, a capability information request for acquiring the user terminal, where the capability information of the user terminal includes capability information of the user terminal. All of the user terminal's capability information digest or part of the user terminal capability information.
  • the receiving module 702 is configured to: after the sending module sends the request message, receive all the capability information of the user terminal returned by the user terminal, the capability information digest of the user terminal, or a part of the user terminal capability information;
  • the verification module 703 is configured to initiate a security verification process to the user terminal according to the received user terminal capability information.
  • verification module 703 specifically includes:
  • the processing module 7031 is configured to send the obtained capability information of the user terminal, the capability information digest of the user terminal, or a part of the user terminal capability information to the user terminal for verification by using an integrity protection security mode command. ;
  • the executing module 7032 is configured to: if the security mode command completion message is received, the verification succeeds, and obtain all the capability information of the user terminal that is fully verified, the capability information digest of the user terminal, or a part of the user terminal capability information; If the message that the security mode command fails or the feedback of the user terminal is not received within the predetermined time, the verification fails, and all the capability information of the user terminal, the capability information digest of the user terminal, or the user terminal capability information is determined. Some of the parts did not pass the verification, release the RRC connection or select the retransmission security mode command.
  • the network side entity is an eNB
  • the security verification of the user terminal capability information the capability information digest of the user terminal, or a part of the user terminal capability information
  • the eNB performs the security verified capability of the user terminal. All of the information, a summary of the capability information of the user terminal, or a portion of the user terminal capability information is sent to ⁇ E.
  • FIG. 8 is a diagram of a structure of a device on a user terminal side according to an embodiment of the present invention, including: a receiving module 801, configured to receive a user terminal capability query request sent by a network side, query all the capability information of the user terminal, and the user terminal Summary of capability information or capability of the user terminal Part of the interest.
  • a receiving module 801 configured to receive a user terminal capability query request sent by a network side, query all the capability information of the user terminal, and the user terminal Summary of capability information or capability of the user terminal Part of the interest.
  • a sending module 802 configured to send, by the receiving module, the user terminal capability query request, to the network side, all of the user terminal capability information, a capability information summary of the user terminal, or a part of the user terminal capability information;
  • the verification module 803 is configured to perform a security verification process on the network side after receiving the security verification command sent by the network side.
  • the security verification command carries the capability information of the user terminal received by the network side.
  • verification module 803 specifically includes:
  • the processing module 8031 is configured to: according to all of the capability information of the user, a part of the capability information summary or the capability information, all the user terminal capability information carried by the received security mode security protection command, the user terminal A summary of the capability information or a portion of the user terminal capability information is verified.
  • the executing module 8032 is configured to perform the operation according to the verification result of the processing module, and includes: if the processing module 8031 is successfully verified, verifying the integrity of the security mode command. And when the integrity verification succeeds, sending a security mode command completion message to the network side;
  • processing module 8031 verifies the change, and abandons the integrity verification of the security mode command, sends a security mode verification failure message to the network side or prohibits feedback to the network side.
  • the network side requests the user terminal for the capability information of the user terminal, and after receiving the capability information returned by the user terminal, the network side sends the capability information to the user terminal.
  • the security verification process is initiated, and the obtained capability information of the user terminal is protected by the security verification process, thereby ensuring the true reliability of the user terminal capability stored on the network side.
  • FIG. 9 is a diagram of a structure of another network-side device according to an embodiment of the present invention, including: a receiving module 901, configured to receive a request message that carries a NAS security algorithm capability information sent by a MN;
  • the verification module 902 is configured to: after receiving the request message, the NAS security algorithm capability information of the user terminal replaces the AS security algorithm capability information of the user terminal, and initiates a verification process, specifically, selecting the RRC by referring to the NAS security algorithm capability information.
  • verification module 902 specifically includes:
  • the processing module 9021 is configured to replace the AS security algorithm capability information of the user terminal with the AS security algorithm capability information, and select an AS security protection algorithm of the user terminal by referring to the NAS security algorithm capability information, and send the AS security mode command to the user terminal. Verification
  • the executing module 9022 is configured to receive an AS security mode command completion message according to the verification result of the processing module, and start the security mode. Alternatively, the message that the security mode verification failure sent by the user terminal is received or the feedback of the user terminal is not received within a predetermined time is determined, the verification fails, the RRC connection is released, or the retransmission security mode command is selected.
  • the present invention can be implemented by means of software and a necessary general hardware platform. Of course, hardware can also be used, but in many cases, the former is better. Implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium, including a plurality of instructions for making a The computer device (which may be a personal computer, server, or network device, etc.) performs the method of various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种保护用户终端能力的方法、 装置 本申请要求于 2008 年 9 月 28 日提交中国专利局、 申请号为 200810216626.0, 发明名称为 "一种保护用户终端能力的方法、 装置和***" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域, 尤其涉及网络安全技术。
背景技术
当前, 移动通信已经发展十分普及, 在移动通信过程中, 通用地面无线 接入网络 ( UTRAN, Universal Terrestrial Radio Access Network ) 包^ ^一 个或几个无线网络子***(RNS, Radio Network Subsystem). 一个 RNS由一 个无线网络控制器 (RNC, Radio Network Controller ) 和一个或多个基站 (NodeB) 组成。
演进的 UTRAN( EUTRAN, Evolved UTRAN )网络结构,包括 eNB( EUTRAN NodeB, 演进基站 ) , eNB之间通过 X2接口实现数据和信令的交互, eNB通过 S1接口 连接演变成分组核心 (EPC, Evolved Packet Core ) 网络的移动性管理实体 (MME, Mobility Management Entity ) 和 ϋ良务网关 ( S-GW , the Serving Gateway )。
在 SAE/LTE***中, 安全保护可以分为应用服务器层(AS , Application Server)安全保护和非接入层 (NAS, Non Acces s Strat腿 )安全保护, AS层 主要保护用户终端和 eNB之间的无线资源控制( RRC, Radio Resource Control ) 信令和用户平面 (UP, User Plane) 的用户数据, NAS层主要保护用户终端 与 MME之间的 NAS信令。
在 SAE/LTE***中, 安全模式启动包括 AS层的安全模式启动和 NAS层的 安全模式启动, 安全模式没有启动之前, 数据和信令都没有安全保护, 安全 模式启动成功后才会启动安全保护。 AS 层安全模式启动时, eNB是根据 eNB 上已知的用户终端能力决定选择用户终端与 eNB之间的安全保护所要采用的
AS算法, 并通过安全模式命令通知用户终端。 AS层安全模式命令携带密钥标 识 KSIasme (KSIasme , Key Set Indentifier )和 eNB根据用户终端能力以及 eNB 自身算法支持能力而选择的 RRC加密算法 EPS AS层信令加密算法 (EAEA , EPS AS Encryption Algorithm), EPS AS层信令完整性保护算法 (EAIA, EPS AS Integrity Algorithm )、 EPS 用户面加密算法 (EUEA, EPS User-plan Encryption Algorithm) 以及携带完整性保护的认证码 AS-MAC。 NAS 层安全 模式启动时, 丽 E向用户终端发送经过完整性保护的安全模式命令, 安全模式 命令携带密钥标识 KS I asme和携带 eNB根据用户终端能力以及固 E自身算法支持 能力而最终选择的 EPS NAS 层加密算法 ( ENEA, EPS NAS Encryption Algorithm )、 EPS NAS 层完整性保护算法 ( ENIA, EPS NAS Integrity Algorithm) 以及携带完整性保护的认证码 NAS- MAC。
在 SAE/LTE ***中, 用户终端的能力可以划分为用户终端空口能力 (UE Radio Capability) 和用户终端网络能力 ( UE Network Capability ) , eNB 上用户终端能力包括空口安全方面的能力以及其他无线传输方面的能力 (如 支持的天线参数), 其中空口方面的安全能力包括用户终端对于 AS 安全层所 支持的算法; 用户终端的网络能力包含了用户终端在 NAS 层的安全能力, 其 中用户终端在 NAS层的安全能力体现在对于 NAS层所支持的 NAS安全算法。
在实现本发明过程中, 发明人发现现有技术中至少存在如下问题: 现有 技术中, 当丽 E处没有用户终端能力信息时, MME向 eNB发送初始上下文请求 消息, 该上下文请求消息用于获取用户终端的空口能力, eNB收到该初始上下 文请求消息后, 如果 eNB没有用户终端空口能力信息, 则 eNB无法选择 AS安 全保护中的 AS层算法, 此时, eNB需要向用户终端发送能力查询请求消息, 以请求得到该用户终端能力信息, 用户终端给 eNB返回能力信息。 在上述过 程中, 因安全模式启动成功后才会启动安全保护, 当 eNB 向用户终端查询用 户终端能力时, AS层的安全模式命还没有启动, 所以 eNB发送的能力查询请 求消息和用户终端返回的能力信息都没有安全保护, 可能会导致出现安全隐 患, 无法保证网络侧存储的用户终端能力信息的真实可靠性。
发明内容
本发明实施方式要解决的主要技术问题是提供一种保护用户终端能力的 方法、 装置, 使得网络侧获得的用户终端的能力信息具有安全保护, 保证了 网络侧存储的用户终端能力信息的真实可靠性。
为了解决上述技术问题, 本发明的实施例提供了一种保护用户终端能力 的方法, 包括:
网络侧向用户终端请求用户终端的能力信息;
网络侧收到用户终端返回的能力信息后, 向用户终端发起安全验证过程。 本发明实施例提供了一种保护用户终端能力的方法, 包括:
用户终端收到网络侧发送的用户终端能力查询请求, 向网络侧发送用户 终端能力信息;
用户终端收到网络侧发送的安全验证命令后, 向网络侧进行安全验证过 程。
本发明实施例提供了一种保护用户终端能力的方法, 包括:
接收匪 E发送的携带 NAS安全算法能力信息的请求消息;
将用户终端的 NAS安全算法能力信息代替用户终端的 AS安全算法能力信 息, 并发起验证过程。
本发明实施例提供了一种网络侧装置, 包括:
发送模块, 用于向用户终端发送获取所述用户终端的能力信息请求; 接收模块, 用于所述发送模块发送请求消息后, 接收所述用户终端返回 的能力信息;
验证模块, 用于根据接收到的所述用户终端能力信息, 向所述用户终端 发起安全验证过程。
本发明实施例提供了一种用户终端侧的装置, 包括: 接收模块, 用于接收网络侧发送的用户终端能力查询请求; 发送模块, 用于接收模块接收到用户终端能力查询请求后, 向网络侧发 送用户终端的能力信息;
验证模块, 用于收到网络侧发送的安全验证命令后, 向网络侧进行安全 验证过程; 该安全验证命令携带网络侧接收的用户终端的能力信息。
本发明实施例提供了一种用户终端侧的装置, 包括:
接收模块, 用于接收丽 E发送的携带 NAS安全算法能力信息的请求消息; 验证模块, 用于接收模块接收请求消息后, 将用户终端的 NAS 安全算法 能力信息代替用户终端的 AS安全算法能力信息, 并发起验证过程。
由上述实施例可知, 网络侧向用户终端请求所述用户终端的能力信息, 网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起安全验证 过程, 通过安全验证过程对获得的用户终端的能力信息进行保护, 保证了网 络侧存储的用户终端能力的真实可靠性。
附图说明
为了更清楚地说明本发明实施例的技术方案, 下面将对实施例描述中所 需要使用的附图作一简单地介绍, 显而易见地, 下面描述中的附图仅仅是本 发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的 前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明实施例中保护用户终端能力方法实施例一的流程图; 图 2为本发明实施例中保护用户终端能力方法实施例二的流程图; 图 3为本发明实施例中保护用户终端能力方法实施例三的流程图; 图 4为本发明实施例中保护用户终端能力方法实施例四的流程图; 图 5为本发明实施例中保护用户终端能力方法实施例五的流程图; 图 6为本发明实施例中保护用户终端能力方法实施例六的流程图; 图 7为本发明实施例中本发明实施例提供的网络侧装置的结构; 图 8为本发明实施例中本发明实施例提供的用户终端侧的装置的结构; 图 9为本发明实施例中本发明实施例提供的另一网络侧的装置的结构。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而 不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作 出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
为使本发明实施例的目的、 技术方案及优点更加清楚明白, 以下对本发 明实施例作进一步详细说明。
本发明实施例提供了一种保护用户终端能力的方法, 如图 1 所示, 本发 明实施例一提供的保护用户终端能力的方法, 其步骤包括:
101、 网络侧向用户终端请求所述用户终端的能力信息;
102、 网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起 安全验证过程。
与上述方法相对应地, 本发明实施例还提供了一种保护用户终端能力的 方法, 如图 2 所示, 本发明实施例二提供的保护用户终端能力的方法, 其步 骤包括:
201、 用户终端收到网絡侧发送的用户终端能力查询请求 , 向所述网络侧 发送所述用户终端的能力信息;
202、 所述用户终端收到所述网络侧发送的安全验证命令后, 向所述网络 侧进行安全验证过程。
由上述实施例可知, 网络侧向用户终端请求所述用户终端的能力信息, 网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起安全验证 过程, 通过安全验证过程对获得的用户终端的能力信息进行保护, 保证了网 络侧存储的用户终端能力的真实可靠性。
以下对上述实施例一和实施例二提供的保护用户终端能力的方法作进一 步详细描述。 如图 3 所示, 为本发明实施例三提供的保护用户终端能力的方法的流程 示意图, 其中该方式为启动 AS安全模式命令保护用户终端能力信息的解决方 案, 包括如下步骤:
301、 丽 E向 eNB发送初始上下文请求;
302、 当 eNB上没有该用户终端的能力信息时, eNB向该用户终端发送能 力查询请求;
303、 该用户终端收到能力查询请求后, 向 eNB发送该用户终端的能力信 息或者该用户终端的能力信息摘要;
304、 eNB收到该用户终端发送的该用户终端的能力信息或者该用户终端 的能力信息摘要后, 将获得的该用户终端的能力信息或者该用户终端的能力 信息摘要通过完整性保护的 AS安全模式命令发送给该用户终端;
305、 该用户终端收到完整性保护的 AS安全模式命令, 该 AS安全模式命 令携带该用户终端的能力信息或者该用户终端的能力信息摘要, 该用户终端 判断自身能力信息或能力信息摘要与 AS安全模式命令携带的该用户终端的能 力信息或者该用户终端的能力信息摘要是否一致。
若一致, 执行步骤 305a。 若不一致, 执行步骤 305b。
305a、 该用户终端开始验证 AS安全模式命令的完整性。 当完整性验证成 功时, 该用户终端向 eNB返回 AS安全模式命令完成消息。
305b , 该用户终端放弃对该安全模式命令的完整性验证, 该用户终端发 送安全模式失败消息给 eNB , 或者禁止向网络侧反馈。
306、 eNB判定用户终端能力是否经过验证;
若收到该用户终端发送的 AS安全模式完成命令, 则 eNB判定该用户终端 能力通过验证, 进入步骤 307。
若收到该用户终端发送的 AS安全模式失败的消息或者没有在预定时间内 收到该用户终端的反馈, 则 eNB判定该用户终端能力没有通过睑证, eNB释放 RRC连接或选择重传安全模式命令。 上述, eNB没有在预定时间内收到该用户终端的反馈, 具体实现可以为: eNB可以设置定时器, 当 eNB获得该用户终端能力信息或者该用户终端能力信 息摘要, 并通过发送完整性保护的 AS安全模式命令将该信息发送给该用户终 端后, 启动该定时器, 如果该用户终端判断自身能力信息或者能力信息摘要 与 AS安全模式命令携带的该用户终端能力信息或者该用户终端能力信息摘要 不一致时, 该用户终端放弃对安全模式命令的完整性验证, 即 eNB 没有在预 定时间内收到该用户终端的反馈, 即定时器超时, eNB释放 RRC连接或选择重 新发送安全模式命令。
307、 eNB向 MME传送上下文响应消息, 该上下文响应消息携带该用户终 端的能力信息。
由上述实施例可知, 网络侧向用户终端请求所述用户终端的能力信息, 网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起安全验证 过程, 通过安全验证过程对获得的用户终端的能力信息进行保护, 保证了网 络侧存储的用户终端能力的真实可靠性。
如图 4 所示, 为本发明实施例四提供的保护用户终端能力的方法的流程 示意图, 其中该方式为启动 NAS 安全模式命令携带用户终端的能力信息, 在 用户终端侧保护用户终端能力信息的解决方案, 包括如下步骤:
401、 丽 E向 eNB发送初始上下文请求;
402、 当 eNB上没有该用户终端的能力信息时, eNB向该用户终端发送能 力查询请求;
403、 该用户终端收到能力查询请求后, 向 eNB发送该用户终端能力信息 的全部或者该用户终端能力信息的一部分或者该用户终端能力信息摘要;
404、 eNB将收到的该用户终端能力信息的全部或者该用户终端能力信息 的一部分或者该用户终端能力信息摘要通过上下文响应消息发送给 MME。
405、 丽 E收到 eNB发送的该用户终端能力信息的全部或者该用户终端能 力信息的一部分或者该用户终端能力信息摘要后, 将该用户终端的能力信息 的全部或者该用户终端能力信息的一部分或者该用户终端能力信息摘要通过 完整性保护的 NAS安全模式命令发送给该用户终端。
406、 该用户终端收到完整性保护的 NAS安全模式命令, 该 NAS安全模式 命令携带该用户终端能力信息的全部或者该用户终端能力信息的一部分或者 该用户终端能力信息摘要, 该用户终端判断自身能力信息的全部或者能力信 息的一部分或者能力信息摘要与 NAS 安全模式命令携带的该用户终端能力信 息的全部或者该用户终端能力的一部分或者该用户终端能力信息摘要是否一 致。 若一致, 执行步骤 407a,若不一致, 执行步骤 407b。
407a、 该用户终端开始验证 NAS 安全模式命令的完整性, 当完整性验证 成功, 则该用户终端向匪 E返回一个 NAS安全模式命令完成消息。
407b , 该用户终端放弃对该安全模式命令的完整性验证。 该用户终端发 送一个安全模式失败的消息给丽E, 或者禁止向 MME反馈。
丽 E若收到 NAS安全模式完成命令, 则该用户终端能力通过验证。
匪 E若收到该用户终端发送的 NAS安全模式失败的消息或者没有在预定时 间内收到该用户终端的反馈, 则匪 E判定该用户终端能力没有通过验证, 丽 E 释放 RRC连接或选择重传安全模式命令。
上述, 丽 E没有在预定时间内收到该用户终端的反馈, 具体实现可以为: 丽 E也可以设置一个定时器, 匪 E获得该用户终端能力信息的全部或者该用户 终端能力信息的一部分或者该用户终端能力信息摘要, 并通过完整性保护的 NAS安全模式命令将获得的该信息发送给该用户终端后, 启动该定时器; 如果 该用户终端判断自身的能力信息的全部或者能力信息的一部分或者能力信息 摘要与完整性保护的 NAS 安全模式命令携带的该用户终端能力信息的全部或 者该用户终端能力信息的一部分或者该用户终端能力信息摘要不一致时, 该 用户终端放弃对安全模式命令的完整性验证, 禁止向 MME反馈。 因此, 匪 E没 有在预定时间收到用户终端的反馈, 即定时器超时, MME释放 RRC连接或选择 重新发送安全模式命令。 由上述实施例可知, 网络侧向用户终端请求所述用户终端的能力信息, 网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起安全验证 过程, 通过安全验证过程对获得的用户终端的能力信息进行保护, 保证了网 络侧存储的用户终端能力的真实可靠性。
另外, 本发明实施例还提供了一种保护用户终端能力的方法, 如图 5 所 示, 本发明实施例五提供的保护用户终端能力的方法, 其步骤包括:
501、 eNB接收 MME发送的携带 NAS安全算法能力信息的请求消息; 502、 eNB将用户终端的 NAS安全算法能力信息代替所述用户终端的 AS安 全算法能力信息, 并发起验证过程。
在本实施例中, eNB根据接收的由固 E发送的 UE的 NAS安全算法能力信 息, 向该 UE发起验证过程, 通过安全验证过程对获得的用户终端的能力信息 进行保护, 保证了网络侧存储的用户终端能力的真实可靠性。
以下对实施例五提供的保护用户终端能力的方法作进一步详细描述。 如图 6 所示, 为本发明实施例六提供的保护用户终端能力的方法的流程 示意图, 其中该方式为 eNB没有用户终端的 AS层安全算法能力的情况下, 参 照用户终端 NAS安全算法能力信息来选择 AS层安全保护算法的解决方案, 包 括以下步骤:
601、 eNB收到 MME发送的初始化上下文请求消息 , 该消息携带用户终端 NAS安全算法能力信息;
当匪 E没有保存该用户终端的空口能力信息时,圆 E向 eNB发送携带该用 户终端的 NAS安全算法能力信息的初始化上下文请求消息;
602、 eNB收到丽 E发送的初始化上下文请求消息后, 获取该消息携带的 该用户终端的 NAS安全算法能力信息, 当 eNB上没有该用户终端的空口能力 信息 (包括 AS安全算法能力信息) 时, eNB参照该用户终端的 NAS安全算法 能力信息选择该用户终端的 AS安全算法能力信息;
eNB将参照该 NAS安全算法能力信息选择 AS层安全保护算法, 包括选择 RRC加密算法 EAEA、 RRC完整性保护算法 EAIA、 用户面加密算法 EUEA。
603、 eNB向该用户终端发送 AS安全模式命令;
eNB将上述 602步骤中该 eNB选择的 AS层安全保护算法, 包括选择 RRC 加密算法 EAEA、 RRC完整性保护算法 EAIA、用户面加密算法 EUEA包含在 AS安 全模式命令消息中, 发送给该用户终端。
604、 该用户终端根据接收到的 AS安全模式命令的算法, 验证 AS安全模 式命令的完整性;
605a、 若该用户终端对 AS安全模式命令的完整性保护验证成功, 则返回 AS安全模式命令完成消息, 启动 AS安全模式后, 执行步骤 606 ;
605b , 若该用户终端对 AS安全模式命令的完整性保护验证失败, 则该用 户终端将发送一个安全模式失败的消息给 eNB后, 执行步骤 605c;
605c、 eNB收到安全模式失败的消息后, 释放 RRC连接, 或者选择重传安 全模式命令。
606、 eNB向该用户终端发送能力查询请求, 此消息已经具有安全保护;
607、 该用户终端向 eNB发送具有安全保护的该用户终端的能力信息;
608、 eNB将具有安全保护的该用户终端能力消息通过上下文响应消息发 送给丽 E。
若该用户终端对 AS安全模式命令的完整性保护验证失败,则也可以在 eNB 上设置一个定时器, 当 eNB将 NAS安全算法能力信息包含在 AS安全模式命令 中, 发送给该用户终端后, 启动该定时器; 当该用户终端对 AS安全模式命令 的完整性保护验证失败, eNB上定时器没有超时之前接收到安全模式失败的消 息时, eNB可以选择重新发送安全模式命令, 当 eNB上定时器超时、 但未接收 到安全模式失败的消息时, eNB释放 RRC连接或选择重传安全模式命令。
在本实施例中, eNB根据接收的由 MME发送的 UE的 NAS安全算法能力信 息, 向该 UE发起验证过程, 通过安全验证过程对获得的用户终端的能力信息 进行保护, 保证了网络侧存储的用户终端能力的真实可靠性。 图 7描述了本发明实施例提供的网络侧装置的结构, 包括 发送模块 701, 用于向用户终端发送获取所述用户终端的能力信息请求, 该用户终端的能力信息包括该用户终端的能力信息的全部、 该用户终端的能 力信息摘要或该用户终端能力信息的一部份。
接收模块 702, 用于发送模块发送请求消息后, 接收该用户终端返回的该 用户终端的能力信息的全部、 该用户终端的能力信息摘要或该用户终端能力 信息的一部份;
验证模块 703 , 用于根据接收到的所述用户终端能力信息, 向所述用户终 端发起安全验证过程。
进一步地, 验证模块 703具体包括:
处理模块 7031 , 用于将获得的该用户终端的能力信息的全部、 该用户终 端的能力信息摘要或该用户终端能力信息的一部份通过完整性保护的安全模 式命令发给该用户终端进行验证;
执行模块 7032 , 用于若接收安全模式命令完成消息, 则验证成功, 获取 经过完全验证的该用户终端的能力信息的全部、 该用户终端的能力信息摘要 或该用户终端能力信息的一部份; 若收到安全模式命令失败的消息或没有在 预定时间内收到该用户终端的反馈, 则验证失败, 判定该用户终端的能力信 息的全部、 该用户终端的能力信息摘要或该用户终端能力信息的一部份没有 通过验证, 释放 RRC连接或选择重传安全模式命令。
网络侧实体为 eNB时, 获取经过安全验证的该用户终端能力信息的全部、 该用户终端的能力信息摘要或该用户终端能力信息的一部份后, eNB将经过安 全验证的该用户终端的能力信息的全部、 该用户终端的能力信息摘要或该用 户终端能力信息的一部份发送给匪 E。
图 8描述了本发明实施例提供的用户终端侧的装置的结构, 包括: 接收模块 801, 用于接收网络侧发送的用户终端能力查询请求, 查询该用 户终端的能力信息的全部、 该用户终端的能力信息摘要或该用户终端能力信 息的一部份。
发送模块 802, 用于该接收模块接收到该用户终端能力查询请求后, 向网 络侧发送该用户终端能力信息的全部、 该用户终端的能力信息摘要或该用户 终端能力信息的一部份;
验证模块 803, 用于收到网络侧发送的安全验证命令后, 向该网络侧进行 安全验证过程; 该安全验证命令携带网络侧接收的用户终端的能力信息。
进一步地, 验证模块 803具体包括:
处理模块 8031 , 用于根据自身的能力信息的全部, 能力信息摘要或能力 信息的一部份, 对收到的通过完整性保护的安全模式命令携带的该用户终端 能力信息的全部、 该用户终端的能力信息摘要或该用户终端能力信息的一部 份进行验证。
执行模块 8032, 用于根据处理模块的验证结果进行操作, 包括: 若处理模块 8031验证成功, 对安全模式命令的完整性进行验证。 并在完 整性验证成功时, 向网络侧发送安全模式命令完成消息;
若处理模块 8031验证失改, 放弃对该安全模式命令的完整性验证后, 向 网络侧发送安全模式验证失败消息或禁止向网络侧反馈。
在本发明实施例提供的网絡侧装置和用户终端侧装置中, 网络侧向用户 终端请求所述用户终端的能力信息, 网络侧收到所述用户终端返回的能力信 息后, 向所述用户终端发起安全验证过程, 通过安全验证过程对获得的用户 终端的能力信息进行保护, 保证了网络侧存储的用户终端能力的真实可靠性。
图 9描述了本发明实施例提供的另一网络侧的装置的结构, 包括: 接收模块 901,用于接收丽 E发送的携带 NAS安全算法能力信息的请求消 息;
验证模块 902 , 用于接收模块接收请求消息后, 将该用户终端的 NAS安全 算法能力信息代替该用户终端的 AS安全算法能力信息, 并发起验证过程, 具 体为参照该 NAS安全算法能力信息选择 RRC加密算法 EAEA、 RRC完整性保护 算法 EAIA、 用户面加密算法 EUEA。
进一步地, 验证模块 902具体包括:
处理模块 9021 ,用于将该用户终端的 NAS安全算法能力信息代替 AS安全 算法能力信息, 参照 NAS安全算法能力信息选择该用户终端的 AS安全保护算 法, 通过 AS安全模式命令发送给该用户终端进行验证;
执行模块 9022 , 用于根据处理模块的验证结果, 接收 AS安全模式命令完 成消息, 启动安全模式。 或者, 收到该用户终端发送的安全模式验证失败的 消息或确定在预定时间内没有收到该用户终端的反馈, 判定验证失败, 释放 RRC连接或者选择重传安全模式命令。
在本实施例中, 根据接收的由 MME发送的 UE的 NAS安全算法能力信息, 向该 UE发起验证过程, 通过安全验证过程对获得的用户终端的能力信息进行 保护, 保证了网络侧存储的用户终端能力的真实可靠性。
通过以上的各实施例的描述, 本领域的技术人员可以清楚地了解到本发 明可借助软件及必需的通用硬件平台的方式来实现, 当然, 也可以通过硬件, 但很多情况下前者是更佳的实施方式。 基于这样的理解, 本发明的技术方案 本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来, 该计算机软件产品存储在一个存储介质中, 包括若干指令用以使得一台计算 机设备(可以是个人计算机, 服务器, 或者网络设备等)执行本发明各个实 施例该的方法。
虽然通过参照本发明的某些优选实施方式, 已经对本发明进行了图示和 描述, 但本领域的普通技术人员应该明白, 可以在形式上和细节上对其作各 种改变, 而不偏离本发明的精神和范围。

Claims

权利要求 书
1、 一种保护用户终端能力的方法, 其特征在于, 包括:
网络侧向用户终端请求所述用户终端的能力信息;
网络侧收到所述用户终端返回的能力信息后, 向所述用户终端发起安全验 证过程。
2、 根据权利要求 1所述方法, 其特征在于, 所述网絡侧向所述用户终端发 起安全验证过程包括:
所述网络侧将获得的所述用户终端的能力信息通过完整性保护的安全模式 命令发给所述用户终端进行验证。
3、 根据权利要求 2所述的方法, 其特征在于, 进一步包括:
若验证成功, 则所述网络侧收到所述用户终端发送的安全模式命令完成消 息, 所述网络侧获取经过安全验证的所述用户终端能力信息。
4、 根据权利要求 2所述的方法, 其特征在于, 进一步包括:
若验证失败, 则所述网络侧收到所述用户终端发送的安全模式命令验证失 败的消息或没有在预定时间内收到所述用户终端的反馈, 所述网络侧判定所述 用户终端的能力信息没有通过验证, 所述网络侧释放无线资源控制 RRC 连接或 重新发送安全模式命令。
5、 根据权利要求 4所述的方法, 其特征在于, 所述的网络侧没有在预定时 间内收到所述用户终端的反馈, 所述网络侧判定所述用户终端的能力信息没有 通过验证, 具体为:
所述网络侧设置定时器, 将获得的所述用户终端的能力信息通过完整性保 护的安全模式命令发给所述用户终端进行验证后, 所述网络侧启动该定时器; 所述网络侧若没有在预定时间内收到所述用户终端的反馈, 所述网络侧判 定所述用户终端的能力信息没有通过验证。
6、 根据权利要求 1至 5中任意一项所述的方法, 其特征在于, 所述的用户 终端的能力信息, 具体为: 所述用户终端的能力信息的全部;
或, 用户终端能力信息的摘要;
或, 用户终端能力信息的一部份。
7、 根据权利要求 3所述的方法, 其特征在于, 所述网络侧获取经过安全验 证的所述用户终端能力信息进一步包括:
所述网络侧实体为演进基站 eNB,则 eNB获取经过安全验证的所述用户终端 的能力信息后, eNB将经过安全验证的所述用户终端的能力信息发送给移动性管 理实体 MME。
8、 根据权利要求 2至 5中任一项所述的方法, 其特征在于, 包括: 如果所述网络侧实体为 eNB, 则所述安全模式命令为应用服务器 AS层安全 模式命令;
如果所述网络侧实体为固£,则所述的安全模式命令为非接入层 NAS层安全 模式命令。
9、 一种保护用户终端能力的方法, 其特征在于, 包括:
用户终端收到网络侧发送的用户终端能力查询请求, 向所述网络侧发送所 述用户终端的能力信息;
所述用户终端收到所述网絡侧发送的安全验证命令后, 向所述网络侧进行 安全验证过程。
10、 根据权利要求 9 所述的方法, 其特征在于, 所述用户终端收到所述网 络侧发送的安全验证命令后, 向所述网络侧进行安全验证过程, 具体为:
所述用户终端将收到的通过完整性保护的安全模式命令携带的所述用户终 端能力信息与所述用户终端自身的能力信息进行睑证。
11、 根据权利要求 10所述的方法, 其特征在于, 进一步包括:
所述用户终端对所述安全模式命令的完整性进行验证, 若完整性验证成功, 所这用户终端发送安全模式命令完成消息。
12、 根据权利要求 10所述的方法, 其特征在于, 进一步包括: 若能力信息验证失败, 则所述用户终端放弃对所述安全模式命令的完整性 验证, 所述用户终端发送安全模式验证失败消息或禁止向网络侧反馈。
13、 一种保护用户终端能力的方法, 其特征在于, 包括:
接收匪 E发送的携带 NAS安全算法能力信息的请求消息;
将用户终端的 NAS安全算法能力信息代替所述用户终端的 AS安全算法能力 信息, 并发起验证过程。
14、 根据权利要求 13所述的方法, 其特征在于, 所述将用户终端的 NAS安 全算法能力信息代替所述用户终端的 AS安全算法能力信息, 并发起验证过程, 具体为:
将所述用户终端的 NAS安全算法能力信息代替 AS安全算法能力信息, 参照 NAS安全算法能力信息选择所述用户终端的 AS安全保护算法,通过 AS安全模式 命令发送给所述用户终端进行验证。
15、 根据权利要求 13所述的方法, 其特征在于, 进一步包括:
对 AS安全模式命令的完整性保护验证成功, 则返回 AS安全模式命令完成 消息, 启动安全模式。
16、 根据权利要求 13所述的方法, 其特征在于, 进一步包括:
若收到所述用户终端发送的安全模式验证失败的消息或在预定时间内没有 收到所述用户终端的反馈, 则判定验证失败, 释放 RRC 连接或者重传安全模式 命令。
17、 根据权利要求 14所述的方法, 其特征在于, 所述参照 NAS安全算法能 力信息选择用户终端的 AS安全保护算法具体包括:
参照该 NAS安全算法能力信息选择 AS层加密算法 EAEA、 AS层完整性保护 算法 EAIA、 AS层用户面加密算法 EUEA。
18、 根据权利要求 13至 17 中任一项所述的保护用户终端能力的方法, 其 特征在于, 包括:
若验证通过, 则将所述通过安全验证的所述用户终端的能力信息发送给所 述丽 E。
19、 一种网络侧装置, 其特征在于, 包括:
发送模块, 用于向用户终端发送获取所述用户终端的能力信息请求; 接收模块, 用于所述发送模块发送请求消息后, 接收所述用户终端返回的 能力信息;
验证模块, 用于根据接收到的所述用户终端能力信息, 向所述用户终端发 起安全验证过程。
20、根据权利要求 19所述的网络侧装置, 其特征在于, 所述验证模块包括: 处理模块, 用于将获得的所述用户终端的能力信息通过完整性保护的安全 模式命令发给所述用户终端进行验证;
执行模块, 用于在验证成功时, 接收安全模式命令完成消息; 在验证失败 时, 接收安全模式命令失败的消息或确定没有在预定时间内收到所述用户终端 的反馈, 释放 R C连接或选择重传安全模式命令。
21、 一种用户终端侧的装置, 其特征在于, 包括:
接收模块, 用于接收网络侧发送的所述用户终端能力查询请求;
发送模块, 用于所述接收模块接收到所述用户终端能力查询请求后, 向所 述网络侧发送所述用户终端的能力信息;
验证模块, 用于收到所述网络侧发送的安全验证命令后, 向所述网络侧进 行安全验证过程; 所述安全验证命令携带所述网络侧接收的用户终端的能力信 息。
22、 根据权利要求 21所述的用户终端侧的装置, 其特征在于, 所述验证模 块包括:
处理模块, 用于根据自身的能力信息, 对收到的通过完整性保护的安全模 式命令携带的所述用户终端的能力信息进行验证;
执行模块, 用于根据所述处理模块的验证结果, 对安全模式命令的完整性 进行验证, 并在完整性验证成功时, 向所述网络侧发送安全模式命令完成消息; 或者, 放弃对所述安全模式命令的完整性验证, 向所述网络侧发送安全模式验 证失败消息或禁止向所述网络侧反馈。
23、 一种网络侧装置, 其特征在于, 包括:
接收模块, 用于接收匪 E发送的携带 NAS安全算法能力信息的请求消息; 验证模块, 用于所述接收模块接收请求消息后, 将所述用户终端的 NAS 安 全算法能力信息代替所述用户终端的 AS安全算法能力信息并发起验证过程。
24、根据权利要求 23所述的网络侧装置, 其特征在于, 所述验证模块包括: 处理模块, 用于将所述用户终端的 NAS安全算法能力信息代替所述 AS安全 算法能力信息, 参照所述 NAS安全算法能力信息选择所述用户终端的 AS安全保 护算法, 通过 AS安全模式命令发送给所述用户终端进行验证;
执行模块, 用于根据所述处理模块的验证结果, 接收所述 AS安全模式命令 完成消息, 启动安全模式; 或者, 收到所述用户终端发送的安全模式验证失败 的消息或确定在预定时间内没有收到所述用户终端的反馈, 判定验证失败, 释 放 RRC连接或者重传安全模式命令。
PCT/CN2009/073775 2008-09-28 2009-09-07 一种保护用户终端能力的方法、装置 WO2010037299A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810216626.0 2008-09-28
CN200810216626.0A CN101686463B (zh) 2008-09-28 2008-09-28 一种保护用户终端能力的方法、装置和***

Publications (1)

Publication Number Publication Date
WO2010037299A1 true WO2010037299A1 (zh) 2010-04-08

Family

ID=42049367

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/073775 WO2010037299A1 (zh) 2008-09-28 2009-09-07 一种保护用户终端能力的方法、装置

Country Status (2)

Country Link
CN (1) CN101686463B (zh)
WO (1) WO2010037299A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110786034A (zh) * 2017-06-23 2020-02-11 日本电气株式会社 网络切片选择的隐私考虑

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142942B (zh) * 2011-04-01 2017-02-08 中兴通讯股份有限公司 一种中继节点***中的数据处理方法及***
CN103220657A (zh) * 2012-01-20 2013-07-24 中兴通讯股份有限公司 一种获取终端能力信息的方法、***及基站
JP5698822B1 (ja) * 2013-10-25 2015-04-08 株式会社Nttドコモ 移動通信方法、移動通信システム及び無線基地局
US9788208B2 (en) * 2015-12-31 2017-10-10 Mediatek Inc. Apparatuses and methods for recovering from security mode command failures
CN108377494B (zh) * 2016-11-22 2020-10-27 深圳市中兴微电子技术有限公司 一种终端异常流程保护方法和装置
KR102268370B1 (ko) * 2017-02-03 2021-06-23 후아웨이 테크놀러지 컴퍼니 리미티드 접속 해제 방법 및 디바이스
CN112672339A (zh) * 2019-10-15 2021-04-16 ***通信有限公司研究院 一种终端能力信息的通知方法、终端及基站
WO2021147053A1 (zh) * 2020-01-22 2021-07-29 华为技术有限公司 数据传输方法、装置及***

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625103A (zh) * 2003-12-01 2005-06-08 中国电子科技集团公司第三十研究所 一种采用公开密钥密码算法数字签名模式的强鉴别方法
CN1913701A (zh) * 2005-08-08 2007-02-14 北京三星通信技术研究有限公司 移动通信***中为不同用户提供不同安全等级业务的方法
WO2007078159A1 (en) * 2006-01-04 2007-07-12 Samsung Electronics Co., Ltd. Method and apparatus for transmitting sip data of idle mode ue in a mobile communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242630B (zh) * 2007-02-05 2012-10-17 华为技术有限公司 安全算法协商的方法、装置及网络***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1625103A (zh) * 2003-12-01 2005-06-08 中国电子科技集团公司第三十研究所 一种采用公开密钥密码算法数字签名模式的强鉴别方法
CN1913701A (zh) * 2005-08-08 2007-02-14 北京三星通信技术研究有限公司 移动通信***中为不同用户提供不同安全等级业务的方法
WO2007078159A1 (en) * 2006-01-04 2007-07-12 Samsung Electronics Co., Ltd. Method and apparatus for transmitting sip data of idle mode ue in a mobile communication system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110786034A (zh) * 2017-06-23 2020-02-11 日本电气株式会社 网络切片选择的隐私考虑
CN110786034B (zh) * 2017-06-23 2024-01-30 日本电气株式会社 用于网络切片隐私考虑的方法、用户设备和功能节点
US11924642B2 (en) 2017-06-23 2024-03-05 Nec Corporation Privacy considerations for network slice selection

Also Published As

Publication number Publication date
CN101686463B (zh) 2013-10-09
CN101686463A (zh) 2010-03-31

Similar Documents

Publication Publication Date Title
WO2010037299A1 (zh) 一种保护用户终端能力的方法、装置
TWI724132B (zh) 無線通訊的方法、用於無線通訊的裝置以及用於執行該方法的電腦程式軟體
KR101411558B1 (ko) 무선 링크 및 핸드오버 실패 처리
JP4926216B2 (ja) アップリンクグラントを処理する方法及び通信装置
JP4750130B2 (ja) 通信システムにおけるネットワーク再進入動作を遂行するシステム及び方法
CN110999523A (zh) 重新连接与无线接入网节点的无线资源控制连接的方法和用户设备
WO2009030155A1 (en) Method, system and apparatus for negotiating the security ability when a terminal is moving
RU2587417C2 (ru) Системы и способы для аутентификации
WO2009155835A1 (zh) 密钥衍生方法、设备及***
TW201008310A (en) Handling of integrity check failure in a wireless communication system
WO2009030164A1 (fr) Procédé, système et dispositif pour empêcher l'attaque par dégradation pendant qu'un terminal se déplace
AU2018366755A1 (en) Connection resume request method and apparatus
TW200908767A (en) Security procedure and apparatus for handover in a 3GPP long term evolution system
JP2012095305A (ja) リンク障害復旧のためのハンドオーバー方法とこの方法を具現するための無線機器及び基地局
TW201208329A (en) Methods and apparatuses facilitating synchronization of security configurations
WO2009152759A1 (zh) 防止网络安全失步的方法和装置
TW202015387A (zh) 在新無線電(nr)中之可擴展之認證協定(eap)實施
JP5888715B2 (ja) モバイル端末のハンドオーバを実行する方法及びシステム、並びに無線セルラ通信ネットワークにおいて用いるように意図されたモバイル端末
WO2011137823A1 (zh) 密钥隔离方法和装置
US20160309523A1 (en) Reducing delay in attachment procedure with a network
WO2020198991A1 (en) Methods and apparatus relating to authentication of a wireless device
JP2020504521A (ja) 無線リソース制御接続の再確立
WO2019017839A1 (zh) 数据传输方法、相关设备以及***
WO2014040259A1 (zh) 一种rrc连接重建方法、设备和网络***
KR20220164762A (ko) Eap 절차에서의 통보

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09817213

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09817213

Country of ref document: EP

Kind code of ref document: A1