WO2015106387A1 - Key verification method, base station, user device and core network element - Google Patents
Key verification method, base station, user device and core network element Download PDFInfo
- Publication number
- WO2015106387A1 WO2015106387A1 PCT/CN2014/070607 CN2014070607W WO2015106387A1 WO 2015106387 A1 WO2015106387 A1 WO 2015106387A1 CN 2014070607 W CN2014070607 W CN 2014070607W WO 2015106387 A1 WO2015106387 A1 WO 2015106387A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- secondary base
- user equipment
- key
- key derived
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Definitions
- the present invention relates to the field of communications, and in particular, to a method for verifying a key, a base station, a user equipment, and a core network element.
- the carrier aggregation of the Long Term Evolution (LTE) system can be roughly divided into intra-base station cell aggregation, inter-base station cell aggregation, and the like.
- the cell aggregation inside the base station is relatively simple because it is controlled by only one evolved base station (eNB).
- eNB evolved base station
- the scheme of inter-base station carrier aggregation is, for example, how to enable dual connectivity of different base stations of a non-ideal backhaul line, that is, how the terminals in the connected state transmit data through the resources of the two base stations to improve the throughput of the terminal.
- the primary base station needs to establish the bearer of the user equipment (User Equipment, UE) to the secondary base station.
- UE User Equipment
- the primary base station or the secondary base station cannot know whether the key associated with the secondary base station derived by the UE is correct.
- the secret key is incorrect, the service between the UE and the secondary base station is interrupted.
- the embodiment of the present invention provides a method for verifying a key, a base station, a user equipment, and a core network element, which can verify whether the key between the user equipment and the secondary base station is correct, and can avoid the key and the corresponding algorithm.
- an embodiment of the present invention provides a base station, where the base station includes: a receiving unit, configured to receive verification information sent by a user equipment, where the verification information is that the user equipment passes the preset data
- the user-derived key and the information obtained by the preset algorithm are protected, and the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm;
- An acquiring unit configured to use, according to the base station, a key, the preset algorithm, and a Determining data and the verification information to obtain target data;
- a determining unit configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the base station.
- the base station further includes: a reset unit, configured to: if the user equipment-derived key is different from the base station-derived key, The user equipment re-derives a key or causes the user equipment to delete the base station.
- the receiving unit is specifically configured to:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the base station is a secondary base station.
- the embodiment of the present invention provides another base station, where the base station includes: a receiving unit, configured to receive verification information sent by the user equipment, where the verification information is that the user equipment passes the preset data.
- the user-derived key and the information obtained by the preset algorithm are protected, and the preset algorithm includes an encryption algorithm and an integrity guarantee. At least one of the algorithms;
- an acquiring unit configured to acquire target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
- a determining unit configured to determine, according to the preset data, the verification information, and the target data, whether a key derived by the user equipment is the same as a key derived by the secondary base station, and a determination result is obtained;
- a sending unit configured to send the determination result to the secondary base station.
- the base station further includes: a reset unit, configured to: if the key derived by the user equipment is different from the derived key of the secondary base station, And causing the user equipment to delete the secondary base station or cause the user equipment to re-derived a key.
- the receiving unit is specifically configured to:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- an embodiment of the present invention provides a user equipment, where the user equipment includes:
- a decryption unit configured to decrypt the received downlink data according to the key derived by the user equipment and a preset algorithm
- a determining unit configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station;
- a sending unit configured to send the determination result to the secondary base station.
- the user equipment further includes:
- a notification unit configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key derived by the secondary base station, or notify the primary base station to re-add the secondary base station; or And the primary base station notifies the secondary base station to re-trigger the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
- an embodiment of the present invention provides a core network element, where the core network element includes:
- a receiving unit configured to receive data that is decrypted by the secondary base station according to the key derived by the secondary base station and the uplink data sent by the user equipment by using a preset algorithm
- a determining unit configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station;
- a sending unit configured to send a result of the determining to the secondary base station.
- the core network element further includes:
- the notification unit configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key derived by the secondary base station, or notify the primary base station to re-add the secondary base station; or And the primary base station notifies the secondary base station to re-trigger the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
- the notification unit is specifically configured to:
- an embodiment of the present invention provides a method for verifying a key, where the method includes:
- the secondary base station receives the verification information sent by the user equipment, where the verification information is obtained by the user equipment, and the preset data is protected by a key derived by the user equipment and a preset algorithm, where the preset algorithm is used. Include at least one of an encryption algorithm and an integrity protection algorithm;
- the secondary base station acquires target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
- the secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- the method further includes: if the user equipment-derived key is different from the secondary base station-derived key, re-derive the user equipment The key or the user equipment is deleted from the secondary base station.
- the verification information sent by the receiving user equipment includes:
- the aggregation protocol data carries the verification information.
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- an embodiment of the present invention provides a method for verifying a key, where the method includes:
- the primary base station receives the verification information sent by the user equipment, where the verification information is information obtained by the user equipment, and the preset data is protected by a key derived by the user equipment and a preset algorithm, and the preset algorithm is used. Include at least one of an encryption algorithm and an integrity protection algorithm;
- the primary base station acquires target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
- the primary base station sends the determination result to the secondary base station.
- the method further includes: if the user equipment-derived key is different from the derived key of the secondary base station, deleting the user equipment The secondary base station or the user equipment is re-derived by a key.
- the verification information sent by the receiving user equipment includes:
- the preset data packet Including at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- an embodiment of the present invention provides a method for verifying a key, where the method includes:
- the user equipment decrypts the received downlink data according to the key and the preset algorithm derived by the user equipment;
- the determining, by the user equipment, whether the key derived by the user equipment and the key derived by the secondary base station are the same according to the decrypted data includes:
- the user equipment acquires an internet protocol address and a port number of the decrypted data packet
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
- the method further includes:
- an embodiment of the present invention provides a method for verifying a key, where the method includes: Receiving, by the core network element, the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm;
- the network element of the core network determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
- the method further includes: notifying the primary base station to delete the secondary base station ; or
- the notifying the primary base station to delete the secondary base station or notifying the primary base station to re-add the secondary base station includes:
- a ninth aspect provides a base station, where the base station includes: a communication interface, a memory, and a processor; the communication interface is configured to communicate with a network element, the memory is configured to store a computer code; and the processor executes the computer The code is used to:
- the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm, where the preset data is protected by a key derived by the user equipment and a preset algorithm.
- the executing, by the processor, the computer code is further used to:
- the user equipment-derived key is different from the base station-derived key, the user equipment is re-derived or the user equipment is deleted.
- the processor executing the computer code is further configured to:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the base station is a secondary base station.
- a base station includes: a communication interface, a memory, a processor; the communication interface is configured to communicate with a network element, the memory is configured to store computer code; and the processor executes the computer code to:
- the executing the computer code by the processor is further used to:
- the user equipment-derived key is different from the derived key of the secondary base station, the user equipment is deleted or the user equipment is re-derived by the user equipment.
- the executing the computer code by the processor is further used to:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- a user equipment includes: Port, memory, processor; the communication interface for communicating with a network element, the memory for storing computer code; the processor executing the computer code for:
- the determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station includes:
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
- the processor executing the computer code is further configured to:
- the primary base station if the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify by the primary base station
- the secondary base station re-triggers the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
- the twelfth aspect provides a core network element, where the core network element includes: a communication interface, a memory, and a processor; the communication interface is configured to communicate with a network element, and the memory is used to store a computer code; The processor executes the computer code for: receiving data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and a preset algorithm;
- the determining, according to the decrypted data, the density derived by the user equipment Whether the key is the same as the key derived by the secondary base station including:
- the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
- the processor executing the computer code is further configured to:
- the primary base station if the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify by the primary base station
- the secondary base station re-triggers the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
- the processor executing the computer code is further configured to:
- An embodiment of the present invention provides a method for verifying a key, a base station, a user equipment, and a core network element.
- the user equipment sends check information to the base station, where the check information is known to the user equipment and the base station.
- the preset data includes at least one of an encryption algorithm and an integrity protection algorithm, and the base station receives the verification information according to the information obtained by the user equipment.
- the same preset algorithm, the key derived by the secondary base station, and the verification information obtain target data, and determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the base station; or the user equipment
- the user equipment After establishing the connection with the secondary base station, after receiving the downlink data packet, the user equipment decrypts the downlink data packet by using the key associated with the secondary base station derived by the user equipment and the corresponding security algorithm, and determines whether the data packet obtained after decryption is correct or not.
- the core network element receives the decrypted data of the uplink data sent by the user equipment according to the base station-derived key and the preset algorithm, and determines the decrypted data. Whether the data packet is correct or not determines whether the key associated with the secondary base station derived by the user equipment is the same as the key derived by the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- FIG. 1 is a schematic structural diagram 1 of a base station according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of a derived key of an LTE system
- FIG. 3 is a schematic structural diagram 2 of a base station according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram 1 of another base station according to an embodiment of the present invention
- FIG. 6 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
- FIG. 8 is a schematic diagram of an embodiment of the present invention.
- FIG. 9 is a schematic structural diagram of a core network element according to an embodiment of the present invention.
- FIG. 9 is a flowchart diagram of a method for verifying a key according to an embodiment of the present invention.
- a flow diagram of a method for verifying a key provided by an embodiment of the present invention Intent four;
- FIG. 14 is a flow chart 5 of a method for verifying a key according to an embodiment of the present invention.
- 15 is a flow chart 6 of a method for verifying a key according to an embodiment of the present invention.
- 16 is a flow chart 7 of a method for verifying a key according to an embodiment of the present invention.
- 17 is a flow chart 8 of a method for verifying a key according to an embodiment of the present invention.
- FIG. 18 is a schematic structural diagram of still another base station according to an embodiment of the present invention
- FIG. 19 is a schematic structural diagram of another base station according to an embodiment of the present invention
- FIG. 20 is another user provided by an embodiment of the present invention
- FIG. 21 is a schematic structural diagram of another core network element according to an embodiment of the present invention.
- the embodiment of the present invention provides a base station 20, which can serve as a secondary base station.
- the secondary base station 20 includes: a receiving unit 21, an obtaining unit 22, and a determining unit 23.
- the receiving unit 21 is configured to receive the verification information sent by the user equipment, where the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm includes the encryption. At least one of an algorithm and an integrity protection algorithm.
- the preset data may be at least one of the following:
- the cell identifier under the secondary base station, the physical cell identifier under the secondary base station, and the secondary base station a temporary identifier of the cell radio network, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary identifier of the cell radio network under the primary base station, identification data stored by the secondary base station and the user equipment, and a primary base station or a secondary base station transmitted to the user Device data, specific numbers.
- KDF Key derivation Functions
- K is a key stored in the Universal Subscriber Identity Module (USIM) and Authentication Center (AuC). It is a permanent fixed key and is the basis of all key generation algorithms.
- USIM Universal Subscriber Identity Module
- AuC Authentication Center
- CK is a key derived from K for encryption
- IK is a key derived from K for integrity protection. Both CK and IK are located in the UE and Home Subscriber Server (HSS).
- HSS Home Subscriber Server
- K ASME is a key derived from the UE and HS S using CK and IK.
- the K eNB is derived from K ASME or derived by the UE and the eNB, and is used to derive various keys of the Access Stratum (AS).
- AS Access Stratum
- the next hop (NH) is a key obtained by the UE and the Mobility Management Entity (MME) through K ASME ⁇ i, which is a type of eNB key.
- the K UPenc UE and the eNB are derived by using the K eNB and the encryption algorithm to protect user plane service data;
- the K UPint is derived by the UE and the eNB through the K eNB and the integrity protection algorithm, and is used to protect user data between the relay node (RN) and the donor base station (Donor eNB, DeNB).
- Radio Resource Control (RRC) related keys :
- K RRCint is derived by the UE and the eNB through the KeNB and the integrity protection algorithm. For protecting RRC messages;
- the K RRC enc is derived by the UE and the eNB through the KeNB and the encryption algorithm, and is used to protect the RRC message.
- K NA S enc is a key derived by the UE and the MME according to KASME, and is used to protect the non-access stratum (Non-Access-Stratum, NAS) stream using an encryption algorithm.
- K NA S in t is a key derived by the UE and the MME according to K ASME , and is used to protect the NAS flow using an integrity protection algorithm.
- the user equipment-derived key associated with the secondary base station may include at least one of the following: KeNB, KuP enc, KuP int. , KRRCint, RRCenc.
- the user equipment obtains the verification information by using an encryption algorithm and K UPenc to protect the cell identifier under the secondary base station.
- the receiving unit 21 may be specifically configured to:
- the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station, and the primary base station sends the base station addition complete message to the secondary base station after receiving the verification information.
- the verification information is carried in the middle.
- carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding security confirmation information (securityConfirmation).
- securityConfirmation For example, it can be implemented by the following code:
- the securityConfirmation can be in the form of a byte stream ( OCTET STRING ) or a bit string (BIT STRING (SIZE (xx)).
- the UE generates a securityConfirmation, which may be an integrity protection result of using a integrity protection algorithm and an integrity protection algorithm for the security Confirmationlnput; or may be an encryption result of using the encryption algorithm and the encryption algorithm of the encryption algorithm for the securityConfirmationlnput; Or a combination of the two.
- a securityConfirmation which may be an integrity protection result of using a integrity protection algorithm and an integrity protection algorithm for the security Confirmationlnput; or may be an encryption result of using the encryption algorithm and the encryption algorithm of the encryption algorithm for the securityConfirmationlnput; Or a combination of the two.
- the securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message.
- the sub-base 4 owes i'J securityConfirmation.
- MAC Medium Access Control
- a new logical channel identifier (LCID) value can be newly introduced to represent securityConfirmation, for example, using 0101 1 , where L is the length of the securityConfirmation, where the securityConfirmation is a fixed length, and there can be no L. Put in securityConfirmation.
- the current LCID value can also be reused, the securityConfirmation can be added to the existing MAC message or the securityConfirmation can be directly transmitted by the UE as data transmission or through the physical layer.
- selecting the preset data in securityConfirmation can be implemented by the following code:
- the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- a securityConfirmation which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- securityConfirmation is the result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint calculation related to the secondary base station, and the securityConfirmation is added to the MAC message sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation.
- the verification information may also be included in Packet Data Convergence Protocol (PDCP) data sent by the user equipment.
- PDCP Packet Data Convergence Protocol
- the verification information may be securityConfirmation
- the preset data is securityConfirmationlnput
- the UE generates a securityConfirmation
- the securityConfirmationlnput uses the force secret algorithm and the result of the encryption calculated by the key of the force secret algorithm; or a combination of the two.
- selecting the preset data in securityConfirmation can be implemented by the following code:
- 4 security securityConfirmation is the use of the force secret algorithm and the secondary and secondary
- the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adding force completion message carries securityConfirmation, and the secondary base occupies 4 owing i'J securityConfirmation.
- the obtaining unit 22 is configured to acquire target data according to a key derived by the base station, a preset algorithm, preset data, and verification information.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the calculation of the securityConfirmationlnput by the UE using the power secret algorithm and the derived KUPenc related to the secondary base station
- the securityConfirmation is added to the primary base station.
- the base station adds the completion message to the secondary base station.
- the secondary base station decrypts the securityConfirmation according to the encryption algorithm and its own derived K UPen to obtain a new SecurityConfirmationInstance.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint related to the security base station, and the securityConfirmationlnput, securityConfirmation
- the secondary base station receives the securityConfirmation and performs integrity protection calculation on the securityConfirmationlnput saved by the integrity protection algorithm and its own derived K UPint or K RRCint to obtain a new securityConfirmation.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is used by the UE.
- the secret algorithm and the derived K UPenc related to the secondary base station calculate the result of the securityConfirmationlnput
- the securityConfirmation is added to the PDCP data sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation and then according to the encryption algorithm and the self-derived K UPenc pair check information. Perform a decryption calculation to get a new SecurityConfirmationlnpu
- the determining unit 23 is configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the derived key of the base station.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput.
- the verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station.
- the securityConfirmationlnput is the UE and the secondary base station.
- the cell identification data of a secondary base station is stored.
- the secondary base station After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K UPint to obtain a new securityConfirmation, and determines the new securityConfirmation and the received securityConfirmation. are the same, then the same as if a UE-derived "1111 to the secondary base station and the secondary base station itself associated with the derived K UPin S, or not identical.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the UE using the integrity protection algorithm and the derived K RRCint related to the security base station to calculate the securityConfirmationlnput
- the securityConfirmationlnput is the UE and
- the secondary base station stores the cell identification data of a secondary base station. After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K RRCint to obtain a new securityConfirmation, and judges the new securityConfirmation and the connection.
- securityConfirmation to L is the same, if the same description of the same UE-derived K RRCint the secondary base station and the secondary base station associated derived K RRCint itself, or not identical.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is that the UE uses the integrity protection algorithm and the derived KUPint related to the secondary base station to protect the securityConfirmationlnput integrity and obtain the intermediate variable securityConfirmationTemp. Then, using the encryption algorithm and the derived K UPenc securityConfirmationTem associated with the secondary base station, j securityConfirmation is obtained.
- the secondary base station After the secondary base occupies ⁇ L ⁇ j securityConfirmation, the secondary base station first uses the encryption algorithm and its own derived K UPenc to decrypt the securityConfirmation and obtains the i'j securityConfirmationTem, and then uses the integrity protection algorithm and derived for the securityConfirmationlnput stored by itself.
- K UPint the new integrity protection securityConfirmationTemp obtained, and then determining new securityConfirmationTem ⁇ $]] the decrypted security Confirmation securityConfirmationTemp are the same, the same as if the UE described shellfish 1 J ⁇ [raw sewage associated with secondary base station K UPenc K UPint is the same as K UPenc and K UPint derived from the secondary base station itself, otherwise it is different.
- the secondary base station 20 further includes:
- the resetting unit 24 is configured to: if the key derived by the user equipment is different from the derived key of the base station, enable the user equipment to re-derivate the key or delete the base station by the user equipment.
- the result of the judgment by the judging unit 23 is that after the integrity protection is performed, the i'J new security Confirmation is different from the i iJ security Confirmation, and the UE-derived sub-base station is associated with the 1 ⁇ 1111 and the auxiliary.
- the base station itself is different from the 1st 1111.
- the secondary base station can notify the UE to delete the secondary base station or cause the UE to re-derivate the key associated with the secondary base station.
- the embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used.
- the method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the base station, a preset algorithm, preset data, and verification information; determining the user equipment according to the preset data, the verification information, and the target data; Whether the derived key is the same as the key derived by the base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- the embodiment of the present invention further provides a base station 30, which can serve as a primary base station.
- the primary base station 30 includes: a receiving unit 3 1 , an obtaining unit 32, a determining unit 33, and a transmitting unit 34.
- the receiving unit 3 1 is configured to receive the verification information sent by the user equipment, where the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm includes an encryption algorithm. At least one of integrity protection algorithms.
- the primary base station receives the radio resource control that is sent by the UE and includes the verification information.
- the radio resource control message may be an RRC Connection Reconfiguration Complete Message, where the verification information is included.
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the obtaining unit 32 is configured to acquire target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
- the primary base station performs the check received from the receiving unit 31 according to the encryption algorithm and the K UPenc derived from the secondary base station (where K UPenc is obtained by the primary base station using the same key derivation process as the secondary base station).
- the information is decrypted to obtain the target data.
- the determining unit 33 is configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment and the derived key of the secondary base station are the same, and the judgment result is obtained.
- the target data is data that the UE protects the preset data by using the user equipment-derived K UPenc and the encryption algorithm
- the target data is K UPem derived from the primary base station according to the encryption algorithm and the secondary base station ; (K UPem here) ; is obtained from the primary base station uses the same key derivation process and the secondary base station) for data obtained by the decryption to check information received from the receiving unit 31 to the primary base station determines whether the target data with the preset data to get the same result of determination .
- the sending unit 34 is configured to send the determination result to the secondary base station.
- the primary base station notifies the secondary base station of the determination result through the X2 interface.
- the primary base station 30 further includes:
- the resetting unit 35 is configured to: if the key derived by the user equipment is different from the derived key of the secondary base station, enable the user equipment to delete the secondary base station or re-derivate the key by the user equipment.
- An embodiment of the present invention provides a base station, which receives verification information sent by a user equipment, where the verification information is a key derived by the user equipment for the preset data by using the user equipment, and is preset.
- the data, the verification information, and the target data are determined to determine whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the determination result is obtained; and the determination result is sent to the secondary base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- the embodiment of the present invention further provides a user equipment 40.
- the user equipment 40 includes: a decryption unit 41, a determination unit 42, and a transmission unit 43.
- the decrypting unit 41 is configured to decrypt the received downlink data according to a key derived by the user equipment and a preset algorithm.
- the preset algorithm may be an encryption algorithm, and a connection is established between the UE and the secondary base station, and the UE decrypts the encrypted downlink data received from the network side according to the key and encryption algorithm derived by the UE, and then obtains
- IP Internet Protocol
- the determining unit 42 is configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- the determining unit 42 is configured to:
- the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
- the determining unit 42 receives the IP packet from the decryption unit 41, and obtains the IP address and port number of the IP file. If the IP address and the port number can be identified, the IP packet is sent to the corresponding application, and It is also indicated that the UE-derived key associated with the secondary base station and the secondary base-derived related key are the same; or,
- the IP packet is an error packet and It is indicated that the UE-derived key associated with the secondary base station is different from the associated key derived by the secondary base station.
- the sending unit 43 is configured to send a determination result to the secondary base station.
- the UE sends the judgment result obtained by the determining unit 42 to the secondary base station through the primary base station.
- the user equipment 40 further includes:
- the notification unit 44 is configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key generated by the secondary base station, or notify the primary base station to re-add the secondary base station, or notify the base station of the secondary base station by using the primary base station.
- the reconfiguration process is re-triggered; or the secondary base station is notified by the primary base station to delete the secondary base station.
- the user equipment 40 may notify the primary base station that the secondary base station has a problem, and may indicate which bearer of the secondary base station is out.
- the problem is that the bearer identifier is carried in the indication, the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the user equipment 40 can notify the secondary base station to restart the re-trigger by the primary base station.
- the connection with the UE is configured; or the user equipment 40 notifies the secondary base station to delete the secondary base station by the primary base station.
- An embodiment of the present invention provides a user equipment, which decrypts received downlink data according to a key derived by the user equipment and a preset algorithm, and determines, according to the decrypted data, a key derived by the user equipment and a key derived by the secondary base station. Whether they are the same; send the judgment result to the secondary base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- An embodiment of the present invention provides a core network element 50.
- the core network element 50 includes:
- the receiving unit 5 1, the judging unit 52, and the transmitting unit 53 are identical to the receiving unit 5 and the transmitting unit 53.
- the receiving unit 5 1 is configured to receive data that is decrypted by the secondary base station according to the key derived by the secondary base station and the uplink data sent by the user equipment according to a preset algorithm.
- the preset data may be an encryption algorithm between the UE and the secondary base station A connection has been established, and the secondary base station decrypts the encrypted uplink data received from the UE according to the key and encryption algorithm derived from the UE to obtain an Internet Protocol (IP) packet, and sends the IP packet to the core network element.
- IP Internet Protocol
- the determining unit 52 is configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- the determining unit 52 is configured to:
- the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the key derived by the user equipment is not the same as the key derived by the secondary base station.
- the determining unit 52 receives the IP packet from the receiving unit 51, and obtains the IP address and the port number of the IP file. If the IP address and the port number can be identified, the IP packet is correct, and the UE-derived The key associated with the secondary base station and the associated key derived by the secondary base station are the same; or,
- the IP packet is an error packet, and the UE-derived key associated with the secondary base station and the secondary base-derived related key are different.
- the core network element 50 further includes:
- the notification unit 54 is configured to: if the key derived by the user equipment is different from the key derived by the secondary base station, the core network element notifies the primary base station to delete the secondary base station; or the core network element notifies the primary base station to re-add the secondary base station; or The core network element notifies the secondary base station to re-trigger the reconfiguration process by the primary base station; or the core network element notifies the secondary base station to delete the secondary base station by the primary base station.
- the notification unit 54 can be specifically configured to:
- the core network element 50 may notify the primary base station through the MME or directly notify the primary base station that the secondary base station has a problem. At the same time, it may indicate that the bearer of the secondary base station has a problem, that is, the bearer identifier is carried in the indication, and the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the core network element 50 The secondary base station may be notified to re-trigger the reconfiguration of the connection with the UE; or the core network element 50 notifies the secondary base station to delete the secondary base station by the primary base station.
- An embodiment of the present invention provides a core network element, where the receiving base station decrypts the uplink data sent by the user equipment according to the key derived by the base station and a preset algorithm; and determines the key derived by the user equipment according to the decrypted data. Whether the key derived from the secondary base station is the same; the result of the judgment is sent to the secondary base station. It is possible to verify that the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- An embodiment of the present invention provides a method for verifying a key. Based on the secondary base station, as shown in FIG. 10, the method includes:
- the secondary base station receives the verification information sent by the user equipment.
- the verification information is obtained by the user equipment, and the preset data includes at least one of an encryption algorithm and a integrity protection algorithm.
- the secondary base station acquires the target data according to the key, the preset algorithm, the preset data, and the verification information derived by the secondary base station.
- the secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- An embodiment of the present invention provides a method for verifying a key.
- the secondary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm.
- the obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; the secondary base station is derived from the secondary base station itself
- the key, the preset algorithm, the preset data, and the verification information acquire the target data; the secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station itself. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- the method includes:
- the secondary base station receives the verification information sent by the user equipment.
- the verification information is information obtained by the user equipment after the preset data is protected by the user-derived key, encryption algorithm, and/or integrity protection algorithm.
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the secondary base station receives the base station addition completion message from the primary base station by using the X2 interface, and the base station addition completion message carries the verification information;
- the secondary base station receives the media access control message sent by the user equipment, where the media access control message carries the verification information;
- the packet packet convergence protocol data carrying the verification information.
- the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station. After receiving the verification information, the primary base station sends the verification information to the secondary base station to send the verification information to the secondary base station.
- carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding a security interface securityConfirmation.
- a security interface securityConfirmation For example, it can be implemented by the following code: RRC Connection Reconfiguration Complete Message
- RRCConnectionReconfigurationComplete SEQUENCE ⁇ rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE ⁇
- the Security Confirmation can be in the form of OCTET STRING or BIT STRING (SIZE (xx).
- selecting the preset data in securityConfirmation can be passed
- the following code is implemented: SEQUENCE ⁇ cellldentity Cellldentity : physCellld PhysCellld c-RNTI C-RNTI
- the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- a securityConfirmation which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- the securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message.
- the sub-base 4 owes i'J securityConfirmation.
- the verification information is included in the MAC message sent by the user equipment, specifically by adding a securityConfirmation in the MAC message.
- a new LCID value can be newly introduced to represent securityConfirmation, for example, using 0101 1 , where L is the length of the securityConfirmation, where the securityConfirmation is a fixed length, and can be directly placed into the securityConfirmation without L.
- the current LCID value can also be reused, the securityConfirmation can be added to the existing MAC message or the securityConfirmation can be directly transmitted by the UE as data transmission or through the physical layer.
- selecting the preset data in securityConfirmation can be implemented by the following code:
- the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- a securityConfirmation which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- securityConfirmation is the result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint calculation related to the secondary base station, and the securityConfirmation is added to the MAC message sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation.
- the verification information may also be included in Packet Data Convergence Protocol (PDCP) data sent by the user equipment.
- PDCP Packet Data Convergence Protocol
- the verification information may be a securityConfirmation
- the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the securityConfirmationlnput: 3 ⁇ 4 integrity protection algorithm and the integrity protection algorithm; or may be a security secret to the securityConfirmationlnput
- a securityConfirmation which may be an integrity protection result of the key calculation used by the securityConfirmationlnput: 3 ⁇ 4 integrity protection algorithm and the integrity protection algorithm; or may be a security secret to the securityConfirmationlnput
- the algorithm and the result of the encryption of the key calculation of the force-to-mouth algorithm or a combination of the two.
- selecting the preset data in securityConfirmation can be implemented by the following code:
- the securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message.
- the sub-base 4 owes i'J securityConfirmation.
- the secondary base station acquires target data according to a key, a preset algorithm, preset data, and check information derived by the secondary base station.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the calculation of the securityConfirmationlnput by the UE using the power secret algorithm and the derived KUPenc related to the secondary base station
- the securityConfirmation is added to the primary base station.
- the base station adds the completion message to the secondary base station.
- the secondary base station decrypts the securityConfirmation according to the encryption algorithm and its own derived K UPenc to obtain a new SecurityConfirmationInstance.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint related to the security base station, and the securityConfirmationlnput, securityConfirmation
- the secondary base station receives the securityConfirmation and performs integrity protection calculation on the securityConfirmationlnput saved by the integrity protection algorithm and its own derived K UPint or K RRCint to obtain a new securityConfirmation.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is used by the UE.
- the secret algorithm and the derived K UPenc related to the secondary base station calculate the result of the securityConfirmationlnput
- the securityConfirmation is added to the PDCP data sent by the UE to the secondary base station
- the secondary base station receives the securityConfirmation and derives according to the encryption algorithm and itself.
- the K UPenc checksum is decrypted to obtain a new SecurityConfirmationlnput.
- the secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station itself.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput.
- the verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station.
- the securityConfirmationlnput is the UE and the secondary base station.
- the cell identification data of one secondary base station is stored, and after receiving the securityConfirmation, the secondary base station performs a complete securityConfirmation on the securityConfirmationlnput according to the integrity protection algorithm and the self-derived K UPint to obtain a new securityConfirmation, and determines the new securityConfirmation and the received Whether the securityConfirmation is the same, if it is, it indicates that the UE-derived K UPint related to the secondary base station is the same as the K UPin S derived by the secondary base station itself, otherwise it is different.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the UE using the integrity protection algorithm and the derived K RRCint related to the security base station to calculate the securityConfirmationlnput
- the securityConfirmationlnput is the UE and
- the secondary base station stores the cell identification data of a secondary base station. After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K RRCint to obtain a new securityConfirmation, and judges the new securityConfirmation and the connection.
- securityConfirmation to L is the same, if the same description of the same UE-derived K RRCint the secondary base station and the secondary base station associated derived K RRCint itself, or not identical.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is that the UE uses the integrity protection algorithm and the derived KUPint related to the secondary base station to protect the securityConfirmationlnput integrity and obtain the intermediate variable securityConfirmationTemp. Then, using the encryption algorithm and the derived K UPenc securityConfirmationTem associated with the secondary base station, j securityConfirmation is obtained.
- the secondary base station uses the encryption algorithm and its own derived K UPenc to decrypt the securityConfirmation and obtain the i'j securityConfirmationTem, and then uses the integrity protection algorithm and the derived K UPint integrity protection for the stored securityConfirmationlnput to obtain a new securityConfirmationTemp.
- new securityConfirmationTem ⁇ are the same and the ground i'J securityConfirmation obtained decrypted securityConfirmationTemp, if the same shellfish described the UE 1 J ⁇ [associated with secondary base station K UPenc raw sewage, K UPint to the secondary station itself derived K UPenc, K UPint corresponds to the same, otherwise it is not the same.
- the secondary base station causes the user equipment to delete the secondary base station or re-derivate the key.
- the secondary base station may notify the UE to delete the secondary base station or cause the UE to re-derived the key associated with the secondary base station.
- An embodiment of the present invention provides a method for verifying a key.
- the secondary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm.
- the obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm;
- the secondary base station acquires target data according to a key derived by the secondary base station itself, a preset algorithm, preset data, and check information;
- the preset data, the verification information, and the target data determine whether the key derived by the user equipment is the same as the key derived by the secondary base station itself. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- An embodiment of the present invention provides a method for verifying a key. Based on a primary base station, as shown in FIG. 12, the method includes:
- the primary base station receives the verification information sent by the user equipment.
- the verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm. At least one of the integrity protection algorithms.
- the primary base station acquires target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
- the primary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the determination result is obtained.
- the primary base station sends the determination result to the secondary base station.
- An embodiment of the present invention provides a method for verifying a key.
- the primary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm.
- the obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm;
- the primary base station acquires target data according to a key derived from the secondary base station, a preset algorithm, preset data, and check information;
- the data, the verification information, and the target data are determined to determine whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained; the primary base station sends the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- a method for providing a verification key based on a primary base station is described in detail below by using a specific embodiment, as shown in FIG. As shown, the method includes:
- the primary base station receives the verification information sent by the user equipment.
- the verification information is obtained by the user equipment, and the preset data includes at least one of an encryption algorithm and a integrity protection algorithm.
- the preset data includes at least one of the following:
- the primary base station receives the radio resource control message that is sent by the UE and includes the verification information.
- the radio resource control message may be an RRC Connection Reconfiguration Complete Message, where the verification information is included.
- the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station. After receiving the verification information, the primary base station sends the verification information to the secondary base station to send the verification information to the secondary base station.
- carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding a security interface.
- RRCConnectionReconfigurationComplete SEQUENCE ⁇ rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE ⁇
- the Security Confirmation can be in the form of OCTET STRING or BIT STRING (SIZE (xx).
- securityConfirmationlnput SEQUENCE ⁇ cellldentity Cellldentity, physCellld PhysCellld, c-RNTI C-RNTI
- the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- a securityConfirmation which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
- security securityConfirmation is the result of the K UPenc calculation performed by the UE using the power secret algorithm and the secondary base station, and the UE sends an RRC Connection Reconfiguration Complete Message to the primary base station, where the RRC Connection Reconfiguration Complete Message carries the securityConfirmation, and the primary base station receives Go to securityConfirmation.
- the primary base station acquires target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput
- the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint related to the secondary base station to calculate the securityConfirmationlnput
- the securityConfirmation is In the RRC Connection Reconfiguration Complete Message sent by the UE to the primary base station, the primary base station receives the securityConfirmation according to the integrity protection algorithm and the K UPint derived from the secondary base station itself (where K UPint is used by the primary base station to use the same key as the secondary base station) The derived process gets) The integrity protection of securityConfirmationlnput gets a new securityConfirmation.
- the primary base station determines, according to the preset data, the target data, and the check information, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
- the verification information is securityConfirmation
- the preset data is securityConfirmationlnput.
- the verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station.
- the securityConfirmationlnput is the UE and the secondary base station.
- the cell identification data of one secondary base station is stored.
- the primary base station uses the KUPint derived from the integrity protection algorithm and the secondary base station itself (here! ⁇ is the same key used by the primary base station as the secondary base station)
- the derivation process obtains a security protection for the securityConfirmationlnput to obtain a new securityConfirmation, and judges whether the new securityConfirmation is the same as the received securityConfirmation. If they are the same, the UE-derived sub-base station-related 1 -1111 and the secondary base station-derived K are derived. UPin S is the same, otherwise it is not the same.
- the primary base station sends the determination result to the secondary base station.
- the primary base station sends the result of the step S303 to the secondary base station through the X2 interface.
- S405 If the key derived by the user equipment is different from the derived key of the secondary base station, the user equipment is deleted or the user equipment is re-derived. Exemplarily, it is assumed that the result that the primary base station determines to the secondary base station is: the UE-derived K UPint associated with the secondary base station and the secondary base station itself are derived! ⁇ is not the same, then the secondary base station can notify the UE to delete the secondary base station or cause the UE to regenerate the key associated with the secondary base station.
- An embodiment of the present invention provides a method for verifying a key, which receives verification information sent by a user equipment, and the verification information is obtained by the user equipment protecting the preset data by using a key derived by the user equipment and a preset algorithm.
- the information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived from the secondary base station, a preset algorithm, preset data, and verification information; according to preset data, verification information And determining, by the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and obtaining a determination result; and sending the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- An embodiment of the present invention provides a method for verifying a key. Based on the UE, as shown in FIG. 14, the method includes:
- the S50 user equipment decrypts the received downlink data according to the key derived by the user equipment and a preset algorithm.
- the user equipment determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- the user equipment determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
- the user equipment obtains the Internet Protocol address and the port number of the decrypted data packet; if the Internet Protocol address and the port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
- the user equipment sends a determination result to the secondary base station.
- An embodiment of the present invention provides a method for verifying a key, where the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm; The device determines whether the key derived by the user equipment is the same as the key derived by the secondary base station according to the decrypted data; the user equipment sends the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm.
- the preset algorithm may be an encryption algorithm, and a connection is established between the UE and the secondary base station, and the UE decrypts the encrypted downlink data received from the network side according to the key and encryption algorithm derived by the UE, and then obtains IP packet.
- the user equipment obtains an internet protocol address and a port number of the decrypted data packet.
- the UE parses the decrypted IP packet to obtain an IP address and a port number of the packet.
- the user equipment determines, according to the Internet Protocol address and the port number of the data packet, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
- the UE has an IP address and a port number to determine whether the key generated by the UE is the same as the key generated by the secondary base station. If the IP address and the port number can be identified, the IP packet is sent to the corresponding application, and The UE-derived key associated with the secondary base station and the secondary base-derived key are the same; if the IP address and/or port number cannot be identified, the IP packet is an error packet, and the UE-derived The key associated with the secondary base station is different from the associated key derived by the secondary base station.
- the user equipment sends a determination result to the secondary base station.
- U E sends the result of the judgment to the secondary base station through the primary base station.
- the user equipment notifies the primary base station to delete the secondary base station, or the user equipment notifies the primary base station to re-add the secondary base station; or the user equipment notifies the secondary base station to notify the secondary base station.
- Base station re-trigger reconfiguration flow The user equipment notifies the secondary base station to delete the secondary base station through the primary base station.
- the UE may notify the primary base station that the secondary base station has a problem, and may indicate which of the secondary base station has a problem.
- the bearer identifier is carried in the indication, the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the UE may notify the secondary base station to re-trigger the reconfiguration with the UE by the primary base station. Connected; or the UE notifies the secondary base station to delete the secondary base station through the primary base station.
- An embodiment of the present invention provides a method for verifying a key.
- the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm.
- the user equipment determines the density of the user equipment according to the decrypted data. Whether the key is the same as the key derived by the secondary base station; the judgment result is sent to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station caused by the key and the corresponding algorithm being incorrect.
- An embodiment of the present invention provides a method for verifying a key. Based on a core network element, as shown in FIG. 16, the method includes:
- the S70 core network element receives the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm.
- the core network element determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
- the core network element determines, according to the decrypted data, whether the key derived by the user equipment and the key derived by the secondary base station are the same:
- the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
- the core network element sends a result of the judgment to the secondary base station.
- An embodiment of the present invention provides a method for verifying a key, where a core network element receives a number of uplinks sent by a secondary base station to a user equipment according to a key derived by the secondary base station and a preset algorithm. According to the decrypted data, the core network element determines whether the key derived by the user equipment is the same as the key derived by the secondary base station according to the decrypted data; the core network element sends the result of the judgment to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- the method includes:
- the core network element receives the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm.
- the preset data may be an encryption algorithm
- a connection is established between the UE and the secondary base station, and the secondary base station decrypts the encrypted uplink data received from the UE according to the key and encryption algorithm derived by the secondary base station to obtain an IP report. If the IP packet is sent to the core network element, the core network element is connected to the IP address.
- the core network element obtains an internet protocol address and a port number of the decrypted data packet.
- the core network element parses the received IP packet to obtain the IP address and port number of the packet.
- the core network element determines, according to the Internet protocol address and the port number of the data packet, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
- the core network element has an IP address and a port number to determine whether the key of the UE 4 is the same as the key derived by the secondary base station. If the IP address and the port number can be identified, the IP packet is sent to the corresponding one.
- the application also shows that the UE-derived key associated with the secondary base station and the secondary base-derived related key are the same; if the IP address and/or port number cannot be identified, the IP packet is an error packet, and It is indicated that the UE-derived key associated with the secondary base station and the secondary base-derived related key are different.
- the core network element sends a determination result to the secondary base station.
- the core network element sends the result of the judgment to the secondary base station. S 805. If the key derived by the user equipment is different from the key generated by the secondary base station, the core network element notifies the primary base station to delete the secondary base station; or the core network element notifies the primary base station to re-add the secondary base station; or the core network The element notifies the secondary base station to re-trigger the reconfiguration process by the primary base station; or the core network element notifies the secondary base station to delete the secondary base station by the primary base station.
- the core network element may notify the primary base station through the MME or directly notify the primary base station that the secondary base station has a problem, and
- the bearer may be instructed to carry the problem, that is, the bearer identifier is carried in the indication, and the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the core network element passes the primary base station.
- the secondary base station is notified to delete the secondary base station.
- An embodiment of the present invention provides a method for verifying a key, where a core network element receives data decrypted by a secondary base station according to a key derived by a secondary base station and a preset algorithm for decrypting uplink data sent by the user equipment; Determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station; the core network element sends the result of the judgment to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- An embodiment of the present invention provides a base station 60.
- the user equipment 60 includes: a bus 64; and a processor 61, a memory 62, and an interface 63 connected to the bus 64, wherein the interface 63 is used for communication;
- the memory 62 is for storing computer code
- the processor 61 is configured to execute the computer code for:
- Receiving the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm and an integrity protection algorithm. At least one
- the user equipment-derived key is determined to be the same as the base station-derived key according to the preset data, the verification information, and the target data.
- the processor 61 executes the computer code and is further configured to: If the key derived by the user equipment is different from the key derived by the base station, the user equipment is re-derived or the user equipment is deleted.
- the processor 61 executes the computer code for receiving the verification information sent by the user equipment, specifically for:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the base station is a secondary base station.
- the embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used.
- the method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the base station, a preset algorithm, preset data, and verification information; determining the user equipment according to the preset data, the verification information, and the target data; Whether the derived key is the same as the key derived by the base station. It is possible to check whether the key between the user equipment and the base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
- the base station 70 includes: a bus 74; and a processor 71, a memory 72, and an interface 73 connected to the bus 74, wherein the interface 73 is used for communication;
- the memory 72 is for storing computer code
- the processor 71 is configured to execute the computer code for: Receiving the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm and an integrity protection algorithm. At least one
- the processor 71 executes the computer code and is further configured to:
- the user equipment deletes the secondary base station or causes the user equipment to re-derived the key.
- the processor 71 executes the computer code for receiving the verification information sent by the user equipment, specifically for:
- the preset data includes at least one of the following:
- a cell identifier under the secondary base station a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
- the embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used.
- the method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the secondary base station, a preset algorithm, preset data, and verification information; determining the user according to the preset data, the verification information, and the target data Whether the key derived by the device is the same as the key derived by the secondary base station, and the judgment result is obtained; the judgment result is sent to the secondary base station. It can check whether the key between the user equipment and the secondary base station is correct, and can avoid the key and the corresponding algorithm being incorrect. Data errors and even business interruptions between the user equipment and the secondary base station.
- An embodiment of the present invention provides a user equipment 80.
- the user equipment 80 includes: a bus 84; and a processor 81, a memory 82, and an interface 83 connected to the bus 84, wherein the interface 83 is used for communication.
- the memory 82 is for storing computer code
- the processor 81 is configured to execute the computer code for:
- the determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station includes:
- the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
- the processor 81 executes the computer code and is further configured to:
- the primary base station If the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify the secondary base station to re-trigger the reconfiguration process by the primary base station; or pass the primary base station.
- the secondary base station is notified to delete the secondary base station.
- the embodiment of the present invention provides a user equipment, where the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm; the user equipment determines, according to the decrypted data, the key derived by the user equipment and the secondary base station. Whether the derived keys are the same; the user equipment sends the judgment result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- the embodiment of the present invention provides a core network element 90.
- the core network element 90 includes: a bus 94; and a processor 91 connected to the bus 94, and stores And an interface 93, wherein the interface 93 is for communication; the memory 92 is for storing computer code, and the processor 91 is configured to execute the computer code for:
- the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
- the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
- the processor 91 executes the computer code and is further configured to:
- the primary base station If the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify the secondary base station to re-trigger the reconfiguration process by the primary base station; or pass the primary base station.
- the secondary base station is notified to delete the secondary base station.
- the processor 91 executes the computer code to notify the primary base station to delete the secondary base station or notify the primary base station to re-add the secondary base station, specifically for:
- An embodiment of the present invention provides a network element of a core network, which receives data obtained by decrypting uplink data sent by a user equipment according to a key derived by a secondary base station and a preset algorithm, and determining, according to the decrypted data, a user equipment derivative. Whether the key is the same as the key derived by the secondary base station; the result of the judgment is sent to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
- the disclosed system, apparatus, and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
- the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
- the units described as separate components may or may not be physically separated, and the components displayed as the units may or may not be physical units, and may be located in one place or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiment of the present embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the integrated unit is implemented in the form of a software functional unit and is independent When the product is sold or used, it can be stored on a computer readable storage medium.
- the instructions include a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods of the various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
一种检验密钥的方法、 基站、 用户设备和核心网网元 技术领域 Method for verifying key, base station, user equipment and core network element
本发明涉及通信领域, 尤其涉及一种校验密钥的方法、 基站、 用户设备和核心网网元。 The present invention relates to the field of communications, and in particular, to a method for verifying a key, a base station, a user equipment, and a core network element.
背景技术 Background technique
长期演进( Long Term Evolution , LTE ) 系统的载波聚合大致可 以分为基站内部小区聚合, 基站间小区聚合等。 基站内部的小区聚 合由于只受一个演进基站 ( Evolution Node B , eNB ) 控制, 相对来 说比较简单。 基站间载波聚合的方案例如为, 如何使非理想回程线 路的不同基站实现双连接, 即对连接态的终端如何通过两个基站的 资源来传送数据, 以提高终端的吞吐。 The carrier aggregation of the Long Term Evolution (LTE) system can be roughly divided into intra-base station cell aggregation, inter-base station cell aggregation, and the like. The cell aggregation inside the base station is relatively simple because it is controlled by only one evolved base station (eNB). The scheme of inter-base station carrier aggregation is, for example, how to enable dual connectivity of different base stations of a non-ideal backhaul line, that is, how the terminals in the connected state transmit data through the resources of the two base stations to improve the throughput of the terminal.
基于基站间载波聚合的方案, 主基站需要将用户设备 ( User Equipment , UE ) 的承载建立到辅基站上。 但是, 上述主基站或者辅 基站无法知道 UE 衍生出来的辅基站相关的密钥是否正确, 当上述 秘钥不正确时, 会导致 UE和辅基站间的业务中断。 Based on the scheme of carrier aggregation between the base stations, the primary base station needs to establish the bearer of the user equipment (User Equipment, UE) to the secondary base station. However, the primary base station or the secondary base station cannot know whether the key associated with the secondary base station derived by the UE is correct. When the secret key is incorrect, the service between the UE and the secondary base station is interrupted.
发明内容 Summary of the invention
本发明的实施例提供一种校验密钥的方法、 基站、 用户设备和 核心网网元, 能够校验用户设备与辅基站之间的密钥是否正确, 可 以避免由于密钥以及相应的算法不正确而导致的用户设备与辅基站 之间的业务中断。 The embodiment of the present invention provides a method for verifying a key, a base station, a user equipment, and a core network element, which can verify whether the key between the user equipment and the secondary base station is correct, and can avoid the key and the corresponding algorithm. The service interruption between the user equipment and the secondary base station caused by the incorrect.
为达到上述目的, 本发明的实施例釆用如下技术方案: In order to achieve the above object, embodiments of the present invention use the following technical solutions:
第一方面, 本发明的实施例提供一种基站, 所述基站包括: 接收单元, 用于接收用户设备发送的校验信息, 所述校验信息 为所述用户设备对预设数据通过所述用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 所述预设算法包括加密算法、 完整性保 护算法中的至少一种; In a first aspect, an embodiment of the present invention provides a base station, where the base station includes: a receiving unit, configured to receive verification information sent by a user equipment, where the verification information is that the user equipment passes the preset data The user-derived key and the information obtained by the preset algorithm are protected, and the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm;
获取单元, 用于根据所述基站衍生的密钥、 所述预设算法、 所 述预设数据以及所述校验信息获取目标数据; An acquiring unit, configured to use, according to the base station, a key, the preset algorithm, and a Determining data and the verification information to obtain target data;
判断单元, 用于根据所述预设数据、 所述校验信息以及所述目 标数据判断所述用户设备衍生的密钥与所述基站衍生的密钥是否相 同。 And a determining unit, configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the base station.
结合第一方面, 在第一种可能的实现方式中, 所述基站还包括: 重置单元, 用于若所述用户设备衍生的密钥与所述基站衍生的 密钥不相同, 则使所述用户设备重新衍生密钥或使所述用户设备删 除所述基站。 With reference to the first aspect, in a first possible implementation, the base station further includes: a reset unit, configured to: if the user equipment-derived key is different from the base station-derived key, The user equipment re-derives a key or causes the user equipment to delete the base station.
结合第一方面, 在第二种可能的实现方式中, 所述接收单元具 体用于: In conjunction with the first aspect, in a second possible implementation, the receiving unit is specifically configured to:
通过 X2 接口从主基站接收所述基站添加完成消息, 所述基站 添加完成消息携带所述校验信息; 或 Receiving, by the X2 interface, the base station addition complete message from the primary base station, where the base station add complete message carries the check information; or
接收所述用户设备发送的媒体接入控制消息, 所述媒体接入控 制消息携带所述校验信息; 或 Receiving, by the user equipment, a media access control message, where the media access control message carries the verification information; or
接收所述用户设备发送的分组包汇聚协议数据, 所述分组包汇 聚协议数据携带所述校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, where the packet packet convergence protocol data carries the verification information.
结合第一方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the first aspect, in a third possible implementation, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
结合第一方面, 在第四种可能的实现方式中, 所述基站为辅基 站。 In conjunction with the first aspect, in a fourth possible implementation, the base station is a secondary base station.
第二方面, 本发明的实施例提供另一种基站, 所述基站包括: 接收单元, 用于接收用户设备发送的校验信息, 所述校验信息 为所述用户设备对预设数据通过所述用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 所述预设算法包括加密算法、 完整性保 护算法中的至少一种; In a second aspect, the embodiment of the present invention provides another base station, where the base station includes: a receiving unit, configured to receive verification information sent by the user equipment, where the verification information is that the user equipment passes the preset data. The user-derived key and the information obtained by the preset algorithm are protected, and the preset algorithm includes an encryption algorithm and an integrity guarantee. At least one of the algorithms;
获取单元, 用于根据辅基站衍生的密钥、 所述预设算法、 所述 预设数据以及所述校验信息获取目标数据; And an acquiring unit, configured to acquire target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
判断单元, 用于根据所述预设数据、 所述校验信息以及所述目 标数据判断所述用户设备衍生的密钥与所述辅基站的衍生的密钥是 否相同, 得到判断结果; a determining unit, configured to determine, according to the preset data, the verification information, and the target data, whether a key derived by the user equipment is the same as a key derived by the secondary base station, and a determination result is obtained;
发送单元, 用于将所述判断结果发送给所述辅基站。 And a sending unit, configured to send the determination result to the secondary base station.
结合第二方面, 在第一种可能的实现方式中, 所述基站还包括: 重置单元, 用于若所述用户设备衍生的密钥与所述辅基站的衍 生的密钥不相同, 则使所述用户设备删除所述辅基站或使所述用户 设备重新衍生密钥。 With reference to the second aspect, in a first possible implementation, the base station further includes: a reset unit, configured to: if the key derived by the user equipment is different from the derived key of the secondary base station, And causing the user equipment to delete the secondary base station or cause the user equipment to re-derived a key.
结合第二方面, 在第二种可能的实现方式中, 所述接收单元具 体用于: With reference to the second aspect, in a second possible implementation, the receiving unit is specifically configured to:
接收所述用户设备发送的无线资源控制消息, 所述无线资源控 制消息携带所述校验信息。 And receiving a radio resource control message sent by the user equipment, where the radio resource control message carries the verification information.
结合第二方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the second aspect, in a third possible implementation manner, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
第三方面, 本发明的实施例提供一种用户设备, 所述用户设备 包括: In a third aspect, an embodiment of the present invention provides a user equipment, where the user equipment includes:
解密单元, 用于根据所述用户设备衍生的密钥、 预设算法对接 收到的下行数据进行解密; a decryption unit, configured to decrypt the received downlink data according to the key derived by the user equipment and a preset algorithm;
判断单元, 用于根据解密后的数据判断所述用户设备衍生的密 钥与辅基站衍生的密钥是否相同, 包括: a determining unit, configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
获取所述解密后的数据包的互联网协议地址和端口号; 若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, Obtaining an internet protocol address and a port number of the decrypted data packet; If the Internet Protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同; If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station;
发送单元, 用于向所述辅基站发送所述判断结果。 And a sending unit, configured to send the determination result to the secondary base station.
结合第三方面, 在第一种可能的实现方式中, 所述用户设备还 包括: With reference to the third aspect, in a first possible implementation, the user equipment further includes:
通知单元, 用于若所述用户设备衍生的密钥与所述辅基站衍生 的密钥不相同, 通知主基站删除所述辅基站; 或通知所述主基站重 新添加所述辅基站; 或通过所述主基站通知所述辅基站重新触发重 配置流程; 或通过所述主基站通知所述辅基站删除所述辅基站。 a notification unit, configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key derived by the secondary base station, or notify the primary base station to re-add the secondary base station; or And the primary base station notifies the secondary base station to re-trigger the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
第四方面, 本发明的实施例提供一种核心网网元, 所述核心网 网元包括: In a fourth aspect, an embodiment of the present invention provides a core network element, where the core network element includes:
接收单元, 用于接收辅基站根据所述辅基站衍生的密钥以及预 设算法对用户设备发送的上行数据进行解密后的数据; a receiving unit, configured to receive data that is decrypted by the secondary base station according to the key derived by the secondary base station and the uplink data sent by the user equipment by using a preset algorithm;
判断单元, 用于根据所述解密后的数据判断所述用户设备衍生 的密钥与所述辅基站衍生的密钥是否相同, 包括: a determining unit, configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
获取所述解密后的数据包的互联网协议地址和端口号; 若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, Obtaining an internet protocol address and a port number of the decrypted data packet; if the internet protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; Or,
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同; If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station;
发送单元, 用于向所述辅基站发送所述判断的结果。 And a sending unit, configured to send a result of the determining to the secondary base station.
结合第四方面, 在第一种可能的实现方式中, 所述核心网网元 还包括: With reference to the fourth aspect, in a first possible implementation manner, the core network element further includes:
通知单元, 用于若所述用户设备衍生的密钥与所述辅基站衍生 的密钥不相同, 通知主基站删除所述辅基站; 或通知所述主基站重 新添加所述辅基站; 或通过所述主基站通知所述辅基站重新触发重 配置流程; 或通过所述主基站通知所述辅基站删除所述辅基站。 结合第四方面的第一种可能的实现方式, 在第二种可能的实现 方式中, 所述通知单元具体用于: a notification unit, configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key derived by the secondary base station, or notify the primary base station to re-add the secondary base station; or And the primary base station notifies the secondary base station to re-trigger the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station. With reference to the first possible implementation of the fourth aspect, in a second possible implementation manner, the notification unit is specifically configured to:
向移动性管理实体发送所述密钥不相同的消息, 并由所述移动 性管理实体向所述主基站转发所述密钥不相同的消息, 以使所述主 基站收到所述密钥不相同的消息后删除所述辅基站或重新添加所述 辅基站; 或通过所述主基站通知所述辅基站重新触发重配置流程; 或通过所述主基站通知所述辅基站删除所述辅基站。 Sending, to the mobility management entity, the message that the keys are different, and forwarding, by the mobility management entity, the message that the keys are different from the primary base station, so that the primary base station receives the key Deleting the secondary base station or re-adding the secondary base station after the same message; or notifying the secondary base station to re-trigger the reconfiguration process by using the primary base station; or notifying the secondary base station to delete the auxiliary by the primary base station Base station.
第五方面, 本发明的实施例提供一种校验密钥的方法, 所述方 法包括: In a fifth aspect, an embodiment of the present invention provides a method for verifying a key, where the method includes:
辅基站接收用户设备发送的校验信息, 所述校验信息为所述用 户设备对预设数据通过所述用户设备衍生的密钥、 预设算法进行保 护后得到的信息, 所述预设算法包括加密算法、 完整性保护算法中 的至少一种; The secondary base station receives the verification information sent by the user equipment, where the verification information is obtained by the user equipment, and the preset data is protected by a key derived by the user equipment and a preset algorithm, where the preset algorithm is used. Include at least one of an encryption algorithm and an integrity protection algorithm;
所述辅基站根据所述辅基站衍生的密钥、 所述预设算法、 所述 预设数据以及所述校验信息获取目标数据; The secondary base station acquires target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
所述辅基站根据所述预设数据、 所述校验信息以及所述目标数 据判断所述用户设备衍生的密钥与所述辅基站衍生的密钥是否相 同。 The secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
结合第五方面, 在第一种可能的实现方式中, 所述方法还包括: 若所述用户设备衍生的密钥与所述辅基站衍生的密钥不相同, 则使所述用户设备重新衍生密钥或使所述用户设备删除所述辅基 站。 With reference to the fifth aspect, in a first possible implementation, the method further includes: if the user equipment-derived key is different from the secondary base station-derived key, re-derive the user equipment The key or the user equipment is deleted from the secondary base station.
结合第五方面, 在第二种可能的实现方式中, 所述接收用户设 备发送的校验信息包括: With reference to the fifth aspect, in a second possible implementation manner, the verification information sent by the receiving user equipment includes:
通过 X2 接口从主基站接收所述基站添加完成消息, 所述基站 添加完成消息携带所述校验信息; 或 Receiving, by the X2 interface, the base station addition complete message from the primary base station, where the base station add complete message carries the check information; or
接收所述用户设备发送的媒体接入控制消息, 所述媒体接入控 制消息携带所述校验信息; 或 Receiving, by the user equipment, a media access control message, where the media access control message carries the verification information; or
接收所述用户设备发送的分组包汇聚协议数据, 所述分组包汇 聚协议数据携带所述校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, where the packet is encapsulated The aggregation protocol data carries the verification information.
结合第五方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the fifth aspect, in a third possible implementation manner, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
第六方面, 本发明的实施例提供一种校验密钥的方法, 所述方 法包括: In a sixth aspect, an embodiment of the present invention provides a method for verifying a key, where the method includes:
主基站接收用户设备发送的校验信息, 所述校验信息为所述用 户设备对预设数据通过所述用户设备衍生的密钥、 预设算法进行保 护后得到的信息, 所述预设算法包括加密算法、 完整性保护算法中 的至少一种; The primary base station receives the verification information sent by the user equipment, where the verification information is information obtained by the user equipment, and the preset data is protected by a key derived by the user equipment and a preset algorithm, and the preset algorithm is used. Include at least one of an encryption algorithm and an integrity protection algorithm;
所述主基站根据辅基站衍生的密钥、 所述预设算法、 所述预设 数据以及所述校验信息获取目标数据; The primary base station acquires target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
所述主基站根据所述预设数据、 所述校验信息以及所述目标数 据判断所述用户设备衍生的密钥与所述辅基站的衍生的密钥是否相 同, 得到判断结果; Determining, by the primary base station, whether the key derived by the user equipment and the derived key of the secondary base station are the same according to the preset data, the verification information, and the target data, to obtain a determination result;
所述主基站将所述判断结果发送给所述辅基站。 The primary base station sends the determination result to the secondary base station.
结合第六方面, 在第一种可能的实现方式中, 所述方法还包括: 若所述用户设备衍生的密钥与所述辅基站的衍生的密钥不相 同, 则使所述用户设备删除所述辅基站或使所述用户设备重新衍生 密钥。 With reference to the sixth aspect, in a first possible implementation, the method further includes: if the user equipment-derived key is different from the derived key of the secondary base station, deleting the user equipment The secondary base station or the user equipment is re-derived by a key.
结合第六方面, 在第二种可能的实现方式中, 所述接收用户设 备发送的校验信息包括: With reference to the sixth aspect, in a second possible implementation manner, the verification information sent by the receiving user equipment includes:
接收所述用户设备发送的无线资源控制消息, 所述无线资源控 制消息携带所述校验信息。 And receiving a radio resource control message sent by the user equipment, where the radio resource control message carries the verification information.
结合第六方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the sixth aspect, in a third possible implementation manner, the preset data packet Including at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
第七方面, 本发明的实施例提供一种校验密钥的方法, 所述方 法包括: In a seventh aspect, an embodiment of the present invention provides a method for verifying a key, where the method includes:
用户设备根据所述用户设备衍生的密钥、 预设算法对接收到的 下行数据进行解密; The user equipment decrypts the received downlink data according to the key and the preset algorithm derived by the user equipment;
所述用户设备根据解密后的数据判断所述用户设备衍生的密钥 与辅基站衍生的密钥是否相同; Determining, by the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station;
所述用户设备向所述辅基站发送所述判断结果; Sending, by the user equipment, the determination result to the secondary base station;
其中, 所述用户设备所述根据解密后的数据判断所述用户设备 衍生的密钥与辅基站衍生的密钥是否相同包括: The determining, by the user equipment, whether the key derived by the user equipment and the key derived by the secondary base station are the same according to the decrypted data includes:
所述用户设备获取所述解密后的数据包的互联网协议地址和端 口号; The user equipment acquires an internet protocol address and a port number of the decrypted data packet;
若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, If the Internet Protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同。 If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
结合第七方面, 在第一种可能的实现方式中, 若所述用户设备 衍生的密钥与所述基站衍生的密钥不相同, 所述方法还包括: With reference to the seventh aspect, in a first possible implementation, if the user equipment-derived key is different from the base station-derived key, the method further includes:
通知主基站删除所述辅基站; 或 Notifying the primary base station to delete the secondary base station; or
通知所述主基站重新添加所述辅基站; 或 Notifying the primary base station to re-add the secondary base station; or
通过所述主基站通知所述辅基站重新触发重配置流程; 或 通过所述主基站通知所述辅基站删除所述辅基站。 Notifying the secondary base station to re-trigger the reconfiguration process by using the primary base station; or informing the secondary base station to delete the secondary base station by using the primary base station.
第八方面, 本发明的实施例提供一种校验密钥的方法, 所述方 法包括: 核心网网元接收辅基站根据所述辅基站衍生的密钥以及预设算 法对用户设备发送的上行数据进行解密后的数据; In an eighth aspect, an embodiment of the present invention provides a method for verifying a key, where the method includes: Receiving, by the core network element, the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm;
所述核心网网元根据所述解密后的数据判断所述用户设备衍生 的密钥与所述辅基站衍生的密钥是否相同; Determining, by the core network element, whether the key derived by the user equipment is the same as the key derived by the secondary base station according to the decrypted data;
所述核心网网元向所述辅基站发送所述判断的结果; Sending, by the core network element, the result of the determining to the secondary base station;
其中, 所述核心网网元根据所述解密后的数据判断所述用户设 备衍生的密钥与所述辅基站衍生的密钥是否相同, 包括: The network element of the core network determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
获取所述解密后的数据包的互联网协议地址和端口号; Obtaining an internet protocol address and a port number of the decrypted data packet;
若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, If the Internet Protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同。 If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
结合第八方面, 在第一种可能的实现方式中, 若所述用户设备 衍生的密钥与所述辅基站衍生的密钥不相同, 所述方法还包括: 通知主基站删除所述辅基站; 或 With reference to the eighth aspect, in a first possible implementation, if the user equipment-derived key is different from the secondary base station-derived key, the method further includes: notifying the primary base station to delete the secondary base station ; or
通知所述主基站重新添加所述辅基站; 或 Notifying the primary base station to re-add the secondary base station; or
通过所述主基站通知所述辅基站重新触发重配置流程; 或 通过所述主基站通知所述辅基站删除所述辅基站。 Notifying the secondary base station to re-trigger the reconfiguration process by using the primary base station; or informing the secondary base station to delete the secondary base station by using the primary base station.
结合第八方面的第一种可能的实现方式, 在第二种可能的实现 方式中, 所述通知主基站删除所述辅基站或通知所述主基站重新添 加所述辅基站包括: With reference to the first possible implementation manner of the eighth aspect, in a second possible implementation, the notifying the primary base station to delete the secondary base station or notifying the primary base station to re-add the secondary base station includes:
向移动性管理实体发送所述密钥不相同的消息, 并由所述移动 性管理实体向所述主基站转发所述密钥不相同的消息, 以使所述主 基站收到所述密钥不相同的消息后删除所述辅基站或重新添加所述 辅基站。 Sending, to the mobility management entity, the message that the keys are different, and forwarding, by the mobility management entity, the message that the keys are different from the primary base station, so that the primary base station receives the key After the different messages, the secondary base station is deleted or the secondary base station is re-added.
第九方面, 提供一种基站, 所述基站包括: 通信接口、 存储器、 处理器; 所述通信接口用于与网元通信, 所述存储器用于存储计算 机代码; 所述处理器执行所述计算机代码用于: A ninth aspect provides a base station, where the base station includes: a communication interface, a memory, and a processor; the communication interface is configured to communicate with a network element, the memory is configured to store a computer code; and the processor executes the computer The code is used to:
接收用户设备发送的校验信息, 所述校验信息为所述用户设备 对预设数据通过所述用户设备衍生的密钥、 预设算法进行保护后得 到的信息, 所述预设算法包括加密算法、 完整性保护算法中的至少 一种; Receiving verification information sent by the user equipment, where the verification information is the user equipment The preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm, where the preset data is protected by a key derived by the user equipment and a preset algorithm.
根据所述基站衍生的密钥、 所述预设算法、 所述预设数据以及 所述校验信息获取目标数据; Obtaining target data according to the key derived by the base station, the preset algorithm, the preset data, and the verification information;
根据所述预设数据、 所述校验信息以及所述目标数据判断所述 用户设备衍生的密钥与所述基站衍生的密钥是否相同。 Determining, according to the preset data, the verification information, and the target data, whether a key derived by the user equipment is the same as a key derived by the base station.
结合第九方面, 在第一种可能的实现方式中, 所述处理器执行 所述计算机代码还用于: With reference to the ninth aspect, in a first possible implementation manner, the executing, by the processor, the computer code is further used to:
若所述用户设备衍生的密钥与所述基站衍生的密钥不相同, 则 使所述用户设备重新衍生密钥或使所述用户设备删除所述基站。 And if the user equipment-derived key is different from the base station-derived key, the user equipment is re-derived or the user equipment is deleted.
结合第九方面, 在第二种可能的实现方式中, 所述处理器执行 所述计算机代码还用于: In conjunction with the ninth aspect, in a second possible implementation, the processor executing the computer code is further configured to:
通过 X2 接口从主基站接收所述基站添加完成消息, 所述基站 添加完成消息携带所述校验信息; 或 Receiving, by the X2 interface, the base station addition complete message from the primary base station, where the base station add complete message carries the check information; or
接收所述用户设备发送的媒体接入控制消息, 所述媒体接入控 制消息携带所述校验信息; 或 Receiving, by the user equipment, a media access control message, where the media access control message carries the verification information; or
接收所述用户设备发送的分组包汇聚协议数据, 所述分组包汇 聚协议数据携带所述校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, where the packet packet convergence protocol data carries the verification information.
结合第九方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the ninth aspect, in a third possible implementation manner, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
结合第九方面, 在第四种可能的实现方式中, 所述基站为辅基 站。 In conjunction with the ninth aspect, in a fourth possible implementation, the base station is a secondary base station.
第十方面, 提供一种基站, 所述基站包括: 通信接口、 存储器、 处理器; 所述通信接口用于与网元通信, 所述存储器用于存储计算 机代码; 所述处理器执行所述计算机代码用于: A tenth aspect, a base station is provided, where the base station includes: a communication interface, a memory, a processor; the communication interface is configured to communicate with a network element, the memory is configured to store computer code; and the processor executes the computer code to:
接收用户设备发送的校验信息, 所述校验信息为所述用户设备 对预设数据通过所述用户设备衍生的密钥、 预设算法进行保护后得 到的信息, 所述预设算法包括加密算法、 完整性保护算法中的至少 一种; Receiving, by the user equipment, the verification information sent by the user equipment, where the verification information is obtained by the user equipment, by using a key derived by the user equipment, and a preset algorithm, where the preset algorithm includes encryption. At least one of an algorithm and an integrity protection algorithm;
根据辅基站衍生的密钥、 所述预设算法、 所述预设数据以及所 述校验信息获取目标数据; Obtaining target data according to the key derived by the secondary base station, the preset algorithm, the preset data, and the verification information;
根据所述预设数据、 所述校验信息以及所述目标数据判断所述 用户设备衍生的密钥与所述辅基站衍生的密钥是否相同, 得到判断 结果; Determining, according to the preset data, the verification information, and the target data, whether a key derived by the user equipment is the same as a key derived by the secondary base station, and obtaining a determination result;
将所述判断结果发送给所述辅基站。 And transmitting the determination result to the secondary base station.
结合第十方面, 在第一种可能的实现方式中, 所述处理器执行 所述计算机代码还用于: With reference to the tenth aspect, in a first possible implementation, the executing the computer code by the processor is further used to:
若所述用户设备衍生的密钥与所述辅基站的衍生的密钥不相 同, 则使所述用户设备删除所述辅基站或使所述用户设备重新衍生 密钥。 And if the user equipment-derived key is different from the derived key of the secondary base station, the user equipment is deleted or the user equipment is re-derived by the user equipment.
结合第十方面, 在第二种可能的实现方式中, 所述处理器执行 所述计算机代码还用于: With reference to the tenth aspect, in a second possible implementation manner, the executing the computer code by the processor is further used to:
接收所述用户设备发送的无线资源控制消息, 所述无线资源控 制消息携带所述校验信息。 And receiving a radio resource control message sent by the user equipment, where the radio resource control message carries the verification information.
结合第十方面, 在第三种可能的实现方式中, 所述预设数据包 括以下中的至少一种: With reference to the tenth aspect, in a third possible implementation manner, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
第十一方面, 提供一种用户设备, 所述用户设备包括: 通信接 口 、 存储器、 处理器; 所述通信接口用于与网元通信, 所述存储器 用于存储计算机代码; 所述处理器执行所述计算机代码用于: In an eleventh aspect, a user equipment is provided, where the user equipment includes: Port, memory, processor; the communication interface for communicating with a network element, the memory for storing computer code; the processor executing the computer code for:
根据所述用户设备衍生的密钥、 预设算法对接收到的下行数据 进行解密; Decrypting the received downlink data according to the key derived by the user equipment and a preset algorithm;
根据解密后的数据判断所述用户设备衍生的密钥与辅基站衍生 的密钥是否相同; Determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station;
向所述辅基站发送所述判断结果; Sending the determination result to the secondary base station;
其中, 所述根据解密后的数据判断所述用户设备衍生的密钥与 辅基站衍生的密钥是否相同包括: The determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station includes:
获取所述解密后的数据包的互联网协议地址和端口号; 若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, Obtaining an internet protocol address and a port number of the decrypted data packet; if the internet protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; Or,
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同。 If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
结合第十一方面, 在第一种可能的实现方式中, 所述处理器执 行所述计算机代码还用于: In conjunction with the eleventh aspect, in a first possible implementation, the processor executing the computer code is further configured to:
若所述用户设备衍生的密钥与所述辅基站衍生的密钥不相同, 通知主基站删除所述辅基站; 或通知所述主基站重新添加所述辅基 站; 或通过所述主基站通知所述辅基站重新触发重配置流程; 或通 过所述主基站通知所述辅基站删除所述辅基站。 And if the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify by the primary base station The secondary base station re-triggers the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
第十二方面, 提供一种核心网网元, 所述核心网网元包括: 通 信接口、 存储器、 处理器; 所述通信接口用于与网元通信, 所述存 储器用于存储计算机代码; 所述处理器执行所述计算机代码用于: 接收辅基站根据所述辅基站衍生的密钥以及预设算法对用户设 备发送的上行数据进行解密后的数据; The twelfth aspect provides a core network element, where the core network element includes: a communication interface, a memory, and a processor; the communication interface is configured to communicate with a network element, and the memory is used to store a computer code; The processor executes the computer code for: receiving data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and a preset algorithm;
根据所述解密后的数据判断所述用户设备衍生的密钥与所述辅 基站衍生的密钥是否相同; Determining, according to the decrypted data, whether a key derived by the user equipment is the same as a key derived by the secondary base station;
向所述辅基站发送所述判断的结果; Sending the result of the determination to the secondary base station;
其中, 所述根据所述解密后的数据判断所述用户设备衍生的密 钥与所述辅基站衍生的密钥是否相同, 包括: The determining, according to the decrypted data, the density derived by the user equipment Whether the key is the same as the key derived by the secondary base station, including:
获取所述解密后的数据包的互联网协议地址和端口号; 若可以识别所述互联网协议地址和所述端口号, 确定所述用户 设备衍生的密钥与所述辅基站衍生的密钥相同; 或, Obtaining an internet protocol address and a port number of the decrypted data packet; if the internet protocol address and the port number are identifiable, determining that the key derived by the user equipment is the same as the key derived by the secondary base station; Or,
若无法识别所述互联网协议地址和 /或所述端口号, 确定所述用 户设备衍生的密钥与所述辅基站衍生的密钥不相同。 If the Internet Protocol address and/or the port number cannot be identified, it is determined that the key derived by the user equipment is different from the key derived by the secondary base station.
结合第十二方面, 在第一种可能的实现方式中, 所述处理器执 行所述计算机代码还用于: In conjunction with the twelfth aspect, in a first possible implementation, the processor executing the computer code is further configured to:
若所述用户设备衍生的密钥与所述辅基站衍生的密钥不相同, 通知主基站删除所述辅基站; 或通知所述主基站重新添加所述辅基 站; 或通过所述主基站通知所述辅基站重新触发重配置流程; 或通 过所述主基站通知所述辅基站删除所述辅基站。 And if the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify by the primary base station The secondary base station re-triggers the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
结合第十二方面的第一种可能的实现方式, 在第二种可能的实 现方式中, 所述处理器执行所述计算机代码还用于: In conjunction with the first possible implementation of the twelfth aspect, in a second possible implementation, the processor executing the computer code is further configured to:
向移动性管理实体发送所述密钥不相同的消息, 并由所述移动 性管理实体向所述主基站转发所述密钥不相同的消息, 以使所述主 基站收到所述密钥不相同的消息后删除所述辅基站或重新添加所述 辅基站。 Sending, to the mobility management entity, the message that the keys are different, and forwarding, by the mobility management entity, the message that the keys are different from the primary base station, so that the primary base station receives the key After the different messages, the secondary base station is deleted or the secondary base station is re-added.
本发明的实施例提供一种校验密钥的方法、 基站、 用户设备和 核心网网元, 用户设备向基站发送校验信息, 该校验信息是用户设 备对用户设备和基站均已知的预设数据通过用户设备衍生的密钥、 预设算法进行保护后得到的信息, 其中, 预设算法包括加密算法、 完整性保护算法中的至少一种, 基站接收到所述校验信息后根据相 同的预设算法、 辅基站衍生的密钥以及校验信息得到目标数据, 根 据预设数据、 校验信息以及目标数据判断用户设备衍生的密钥与基 站衍生的密钥是否相同; 或用户设备与辅基站建立连接后, 用户设 备接收到下行数据包后使用用户设备衍生的与辅基站相关的密钥以 及相应的安全算法对下行数据包进行解密, 判断解密后得到的数据 包是否正确从而判断用户设备衍生的与辅基站相关的密钥是否与辅 基站衍生的密钥相同; 或用户设备与辅基站建立连接后, 核心网网 元接收基站根据基站衍生的密钥以及预设算法对用户设备发送的上 行数据进行解密后的数据, 判断解密后得到的数据包是否正确从而 判断用户设备衍生的与辅基站相关的密钥是否与辅基站衍生的密钥 相同。 能够校验用户设备与辅基站之间的密钥是否正确, 可以避免 由于密钥以及相应的算法不正确而导致的用户设备与辅基站之间的 数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key, a base station, a user equipment, and a core network element. The user equipment sends check information to the base station, where the check information is known to the user equipment and the base station. The preset data includes at least one of an encryption algorithm and an integrity protection algorithm, and the base station receives the verification information according to the information obtained by the user equipment. The same preset algorithm, the key derived by the secondary base station, and the verification information obtain target data, and determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the base station; or the user equipment After establishing the connection with the secondary base station, after receiving the downlink data packet, the user equipment decrypts the downlink data packet by using the key associated with the secondary base station derived by the user equipment and the corresponding security algorithm, and determines whether the data packet obtained after decryption is correct or not. Whether the key associated with the secondary base station derived from the user equipment is auxiliary The base station-derived key is the same; after the user equipment establishes a connection with the secondary base station, the core network element receives the decrypted data of the uplink data sent by the user equipment according to the base station-derived key and the preset algorithm, and determines the decrypted data. Whether the data packet is correct or not determines whether the key associated with the secondary base station derived by the user equipment is the same as the key derived by the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
附图说明 DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下 面将对实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于 本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以 根据这些附图获得其他的附图。 In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图 1为本发明的实施例提供的一种基站的结构示意图一; 图 2为 LTE系统衍生密钥的流程示意图; FIG. 1 is a schematic structural diagram 1 of a base station according to an embodiment of the present invention; FIG. 2 is a schematic flowchart of a derived key of an LTE system;
图 3为本发明的实施例提供的一种基站的结构示意图二; 图 4为本发明的实施例提供的另一种基站的结构示意图一; 图 5为本发明的实施例提供的另一种基站的结构示意图二; 图 6为本发明的实施例提供的一种用户设备的结构示意图一 图 7为本发明的实施例提供的一种用户设备的结构示意图二 图 8为本发明的实施例提供的一种核心网元的结构示意图一 图 9为本发明的实施例提供的一种核心网元的结构示意图二 10 为本发明的实施例提供的一种校验密钥的方法的流程示 FIG. 3 is a schematic structural diagram 2 of a base station according to an embodiment of the present invention; FIG. 4 is a schematic structural diagram 1 of another base station according to an embodiment of the present invention; FIG. FIG. 6 is a schematic structural diagram of a user equipment according to an embodiment of the present invention. FIG. 7 is a schematic structural diagram of a user equipment according to an embodiment of the present invention. FIG. 8 is a schematic diagram of an embodiment of the present invention. FIG. 9 is a schematic structural diagram of a core network element according to an embodiment of the present invention. FIG. 9 is a flowchart diagram of a method for verifying a key according to an embodiment of the present invention.
为本发明的实施例提供的一种校验密钥的方法的流程示 A flow diagram of a method for verifying a key provided by an embodiment of the present invention
12 为本发明的实施例提供的一种校验密钥的方法的流程示 12 is a flow chart of a method for verifying a key provided by an embodiment of the present invention
为本发明的实施例提供的一种校验密钥的方法的流程示 意图四; A flow diagram of a method for verifying a key provided by an embodiment of the present invention Intent four;
图 14 为本发明的实施例提供的一种校验密钥的方法的流程示 意图五; FIG. 14 is a flow chart 5 of a method for verifying a key according to an embodiment of the present invention; FIG.
图 15 为本发明的实施例提供的一种校验密钥的方法的流程示 意图六; 15 is a flow chart 6 of a method for verifying a key according to an embodiment of the present invention;
图 16 为本发明的实施例提供的一种校验密钥的方法的流程示 意图七; 16 is a flow chart 7 of a method for verifying a key according to an embodiment of the present invention;
图 17 为本发明的实施例提供的一种校验密钥的方法的流程示 意图八; 17 is a flow chart 8 of a method for verifying a key according to an embodiment of the present invention;
图 18为本发明的实施例提供的又一种基站的结构示意图; 图 19为本发明的实施例提供的再一种基站的结构示意图; 图 20为本发明的实施例提供的另一种用户设备的结构示意图; 图 21 为本发明的实施例提供的另一种核心网网元的结构示意 图。 FIG. 18 is a schematic structural diagram of still another base station according to an embodiment of the present invention; FIG. 19 is a schematic structural diagram of another base station according to an embodiment of the present invention; FIG. 20 is another user provided by an embodiment of the present invention. FIG. 21 is a schematic structural diagram of another core network element according to an embodiment of the present invention.
具体实施方式 detailed description
下面将结合本发明实施例中的附图, 对本发明实施例中的技术 方案进行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明 一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本 领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他 实施例, 都属于本发明保护的范围。 The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
本发明的实施例提供一种基站 20 , 该基站 20可以作为辅基站, 如图 1 所示, 该辅基站 20 包括: 接收单元 21、 获取单元 22以及判 断单元 23。 The embodiment of the present invention provides a base station 20, which can serve as a secondary base station. As shown in FIG. 1, the secondary base station 20 includes: a receiving unit 21, an obtaining unit 22, and a determining unit 23.
其中, 接收单元 21 , 用于接收用户设备发送的校验信息, 校验 信息为用户设备对预设数据通过用户设备衍生的密钥、 预设算法进 行保护后得到的信息, 预设算法包括加密算法、 完整性保护算法中 的至少一种。 The receiving unit 21 is configured to receive the verification information sent by the user equipment, where the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm includes the encryption. At least one of an algorithm and an integrity protection algorithm.
其中, 预设数据可以是以下中的至少一种: The preset data may be at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 The cell identifier under the secondary base station, the physical cell identifier under the secondary base station, and the secondary base station a temporary identifier of the cell radio network, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary identifier of the cell radio network under the primary base station, identification data stored by the secondary base station and the user equipment, and a primary base station or a secondary base station transmitted to the user Device data, specific numbers.
为方便描述, 以下对 LTE系统中安全密钥的衍生关系做简单说 明, 其中, LTE系统 UE侧和演进分组系统( Evolved Packet System , EPS )侧的密钥相互独立, 两侧密钥衍生流程相同, 均釆用密钥派生 函数 ( Key Derivation Functions , KDF ) 逐级 4汙生, ¾口图 2所示: For the convenience of description, the following describes the derivative relationship of the security key in the LTE system. The keys on the UE side of the LTE system and the Evolved Packet System (EPS) are independent of each other. , Key derivation Functions (KDF) are graded 4, and 3⁄4 port is shown in Figure 2:
K 是存储在全球用户识别卡 ( Universal Subscriber Identity Module , USIM )和认证中心(Authentication Center , AuC) 里的密钥, 是永久固定密钥, 也是所有密钥生成算法的基础。 K is a key stored in the Universal Subscriber Identity Module (USIM) and Authentication Center (AuC). It is a permanent fixed key and is the basis of all key generation algorithms.
CK是由 K衍生的用于加密的密钥, IK是 K衍生的用于完整性 保护的密钥。 CK和 IK均位于 UE和归属地寄存器( Home Subscriber Server, HSS ) 中。 CK is a key derived from K for encryption, and IK is a key derived from K for integrity protection. Both CK and IK are located in the UE and Home Subscriber Server (HSS).
KASME是一个由 UE和 HS S使用 CK和 IK衍生的密钥。 K ASME is a key derived from the UE and HS S using CK and IK.
KeNB是由 KASME 衍生或由 UE和 eNB衍生的, 用于衍生接入层 ( Access Stratum , AS ) 的各种密钥。 The K eNB is derived from K ASME or derived by the UE and the eNB, and is used to derive various keys of the Access Stratum (AS).
下一跳 ( Next Hop , NH ) 是 UE 和移动性管理实体 ( Mobility Management Entity , MME ) 通过 KASME ^i汙生得到的密钥, 是 eNB密 钥的一种。 The next hop (NH) is a key obtained by the UE and the Mobility Management Entity (MME) through K ASME ^i, which is a type of eNB key.
用户面业务的密钥: Key to the user plane service:
KUPenc UE和 eNB通过 KeNB 以及加密算法衍生得到的, 用于 保护用户面业务数据; The K UPenc UE and the eNB are derived by using the K eNB and the encryption algorithm to protect user plane service data;
KUPint是 UE和 eNB通过 KeNB以及完整性保护算法衍生得到的, 用于保护中继节点( Relay Node, RN )和宿主基站(Donor eNB,DeNB) 间的用户数据。 The K UPint is derived by the UE and the eNB through the K eNB and the integrity protection algorithm, and is used to protect user data between the relay node (RN) and the donor base station (Donor eNB, DeNB).
无线资源控制协议 ( Radio Resource Control , RRC ) 相关的密 钥: Radio Resource Control (RRC) related keys:
KRRCint 是 UE和 eNB通过 KeNB以及完整性保护算法衍生得到 的, 用于保护 RRC消息; K RRCint is derived by the UE and the eNB through the KeNB and the integrity protection algorithm. For protecting RRC messages;
KRRCenc是 UE和 eNB通过 KeNB 以及加密算法衍生得到的, 用 于保护 RRC消息。 The K RRC enc is derived by the UE and the eNB through the KeNB and the encryption algorithm, and is used to protect the RRC message.
KNA Senc是 UE和 MME根据 KASME衍生的密钥,用于对非接入 层 (Non-Access-Stratum , NAS ) 流使用加密算法进行保护。 K NA S enc is a key derived by the UE and the MME according to KASME, and is used to protect the non-access stratum (Non-Access-Stratum, NAS) stream using an encryption algorithm.
KNA S int是 UE和 MME根据 KASME衍生的密钥, 用于对 NAS流 使用完整性保护算法进行保护。 K NA S in t is a key derived by the UE and the MME according to K ASME , and is used to protect the NAS flow using an integrity protection algorithm.
具体的, 用户设备衍生的与辅基站相关的密钥可以包括下面至 少一种: KeNB、 KuP enc、 KuP int。、 KRRCint、 RRCenc。 Specifically, the user equipment-derived key associated with the secondary base station may include at least one of the following: KeNB, KuP enc, KuP int. , KRRCint, RRCenc.
示例性的, 用户设备对辅基站下的小区标识使用加密算法以及 KUPenc进行保护后得到校验信息。 Exemplarily, the user equipment obtains the verification information by using an encryption algorithm and K UPenc to protect the cell identifier under the secondary base station.
可选的, 接收单元 21可以具体用于: Optionally, the receiving unit 21 may be specifically configured to:
通过 X2 接口从主基站接收基站添加完成消息, 基站添加完成 消息携带校验信息; 或 Receiving, by the X2 interface, a base station addition completion message from the primary base station, and the base station addition completion message carries the verification information; or
接收用户设备发送的媒体接入控制消息, 媒体接入控制消息携 带校验信息; 或 Receiving a media access control message sent by the user equipment, where the media access control message carries the verification information; or
接收用户设备发送的分组包汇聚协议数据, 分组包汇聚协议数 据携带校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, and the packet packet convergence protocol data carries verification information.
示例性的, 校验信息是可以包含在 UE 向主基站发送的无线资 源连接重配置完成消息 ( RRC Connection Reconfiguration Complete Message ) 中, 主基站接收到该校验信息后向辅基站发送基站添加完 成消息中携带该校验信息。 For example, the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station, and the primary base station sends the base station addition complete message to the secondary base station after receiving the verification information. The verification information is carried in the middle.
具体的, 在无线资源连接重配置完成消息中携带校验信息可以 通过增加安全确认信息 ( securityConfirmation ) 来实现。 示例性的, 可以通过以下代码实现: Specifically, carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding security confirmation information (securityConfirmation). For example, it can be implemented by the following code:
RRC Connection Reconfiguration Complete Message RRC Connection Reconfiguration Complete Message
-- ASN 1 START -- ASN 1 START
RRCConnectionReconfigurationComplete:: rrc-Transactionldentifier RRC-Transactionldentifier criticalExtensions CHOICE { RRCConnectionReconfigurationComplete:: rrc-Transactionldentifier RRC-Transactionldentifier criticalExtensions CHOICE {
rrcConnectionReconfigurationComplete-r8 rrcConnectionReconfigurationComplete-r8
RRCConnectionReconfigurationComplete-r8-IEs, RRCConnectionReconfigurationComplete-r8-IEs,
criticalExtensionsFuture SEQUENCE { } criticalExtensionsFuture SEQUENCE { }
} }
} }
RRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCERRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCE
{ {
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-v8aO-IEs : :=RRCConnectionReconfigurationComplete-v8aO-IEs : :=
SEQUENCE { SEQUENCE {
lateNonCriticalExtension OCTET STRING lateNonCriticalExtension OCTET STRING
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v l 020-IEs OPTIONAL } RRCConnectionReconfigurationComplete-v l 020-IEs OPTIONAL }
RRCConnectionReconfigurationComplete-v l 020-IEs : :=RRCConnectionReconfigurationComplete-v l 020-IEs : :=
SEQUENCE { SEQUENCE {
rlf-InfoAvailable-r l O ENUMERATED {true } rlf-InfoAvailable-r l O ENUMERATED {true }
OPTIONAL, OPTIONAL,
logMeasAvailable-rl O ENUMERATED {true } logMeasAvailable-rl O ENUMERATED {true }
OPTIONAL, nonCriticalExtension OPTIONAL, nonCriticalExtension
RRCConnectionReconfigurationComplete-v l l 30-IEs OPTIONAL RRCConnectionReconfigurationComplete-v l l 30-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-v l 130-IEs :: =RRCConnectionReconfigurationComplete-v l 130-IEs ::=
SEQUENCE { SEQUENCE {
connEstFaillnfoAvailable-r l 1 ENUMERATED {true } connEstFaillnfoAvailable-r l 1 ENUMERATED {true }
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v l 2xx-IEs RRCConnectionReconfigurationComplete-v l 2xx-IEs
OPTIONAL OPTIONAL
} }
RRCConnectionReconfigurationComplete-v l 2xx-IEs : :=RRCConnectionReconfigurationComplete-v l 2xx-IEs : :=
SEQUENCE { SEQUENCE {
securityConfirmation OCTET STRING securityConfirmation OCTET STRING
OPTIONAL, OPTIONAL,
nonCriticalExtension SEQUENCE { } nonCriticalExtension SEQUENCE { }
OPTIONAL OPTIONAL
} }
- ASN 1 STOP - ASN 1 STOP
其中 securityConfirmation可以为字节流 ( OCTET STRING ) 或 者位串(BIT STRING (SIZE (xx))的形式等。 The securityConfirmation can be in the form of a byte stream ( OCTET STRING ) or a bit string ( BIT STRING (SIZE (xx)).
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: security Confirmationlnput: := SEQUENCE { cellldentity Cellldentity: physCellld PhysCellld c-RNTI C-RNTI Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code: security Confirmationlnput: := SEQUENCE { cellldentity Cellldentity : physCellld PhysCellld c-RNTI C-RNTI
- ASN 1 STOP - ASN 1 STOP
其 中 UE 产 生 securityConfirmation , 可 以 是对 security Confirmationlnput 使用完整性保护算法以及完整性保护算法的密钥 计算的完整性保护结果; 也可以是对 securityConfirmationlnput使用 加密算法以及加密算法的密钥计算的加密的结果; 或者是两者的组 合。 The UE generates a securityConfirmation, which may be an integrity protection result of using a integrity protection algorithm and an integrity protection algorithm for the security Confirmationlnput; or may be an encryption result of using the encryption algorithm and the encryption algorithm of the encryption algorithm for the securityConfirmationlnput; Or a combination of the two.
4叚设 securityConfirmation是 UE使用力口密算法和^汙生的与辅基 站有关的 KUPenc计算的结果,主基站通过 X2接口向辅基站发送基站 添力口完成消息, 其中基站添力口完成消息携带 securityConfirmation , 辅基 占接 4欠 i'J securityConfirmation。 4. The securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message. Carrying securityConfirmation, the sub-base 4 owes i'J securityConfirmation.
或者, 示例性的, 如果校验信息是包含在用户设备发送的媒体 接入控制 ( Medium Access Control , MAC ) 消息中, 具体可以通过 在 MAC消息中增力口 securityConfirmation来实现。 Or, exemplarily, if the verification information is included in a Medium Access Control (MAC) message sent by the user equipment, specifically by adding a securityConfirmation in the MAC message.
例如,可以新引入一个逻辑信道标识( Logical Channel Identify , LCID ) 值专门表示是 securityConfirmation , 比如使用 0101 1 , 其中 L表示 securityConfirmation的长度,这里面 ^口果 securityConfirmation 是固定长度的, 可以没有 L , 直接放入 securityConfirmation。 也可 以重用 目前的 LCID 值, 将 securityConfirmation 加到现有的 MAC 消息中或者还可以由 UE直接将 securityConfirmation 当成数据传输 或者通过物理层传输。 For example, a new logical channel identifier (LCID) value can be newly introduced to represent securityConfirmation, for example, using 0101 1 , where L is the length of the securityConfirmation, where the securityConfirmation is a fixed length, and there can be no L. Put in securityConfirmation. The current LCID value can also be reused, the securityConfirmation can be added to the existing MAC message or the securityConfirmation can be directly transmitted by the UE as data transmission or through the physical layer.
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code:
securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity, securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity,
physCellld PhysCellld, c-RNTI C-RNTI physCellld PhysCellld, c-RNTI C-RNTI
- ASN 1 STOP - ASN 1 STOP
其 中 UE 产 生 securityConfirmation , 可 以 是 对 securityConfirmationlnput使用完整性保护算法以及完整性保护算法 的 密 钥 计 算 的 完 整 性 保 护 结 果 ; 也 可 以 是 对 securityConfirmationlnput使用力口密算法以及力口密算法的密钥计算的 加密的结果; 或者是两者的组合。 The UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
假设 securityConfirmation是 UE使用完整性保护算法和衍生的 与辅基站有关的 KUPint或者 KRRCint计算的结果, securityConfirmation 是添加到 UE 发送给辅基站的 MAC 消息中的, 辅基站接收到 securityConfirmation。 It is assumed that securityConfirmation is the result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint calculation related to the secondary base station, and the securityConfirmation is added to the MAC message sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation.
或者, 校验信息还可以包含在用户设备发送的分组包汇聚协议 ( Packet Data Convergence Protocol , PDCP ) 数据中。 Alternatively, the verification information may also be included in Packet Data Convergence Protocol (PDCP) data sent by the user equipment.
示例性的, 校验信息可以是 securityConfirmation , 预设数据为 securityConfirmationlnput , UE产生 securityConfirmation , 可以、是 对 securityConfirmationlnput使用完整性保护算法以及完整性保护算 法 的 密 钥 计 算 的 完 整 性 保 护 结 果 ; 也 可 以 是 对 securityConfirmationlnput使用力口密算法以及力口密算法的密钥计算的 加密的结果; 或者是两者的组合。 Exemplarily, the verification information may be securityConfirmation, the preset data is securityConfirmationlnput, the UE generates a securityConfirmation, and may be an integrity protection result of the key calculation of the integrity protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be The securityConfirmationlnput uses the force secret algorithm and the result of the encryption calculated by the key of the force secret algorithm; or a combination of the two.
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code:
securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity, securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity,
physCellld PhysCellld, physCellld PhysCellld,
c-RNTI C-RNTI c-RNTI C-RNTI
} }
- ASN 1 STOP - ASN 1 STOP
4叚设 securityConfirmation是 UE使用力口密算法和^汙生的与辅基 站有关的 KUPenc计算的结果,主基站通过 X2接口向辅基站发送基站 添力口完成消息, 其中基站添力口完成消息携带 securityConfirmation , 辅基 占接 4欠 i'J securityConfirmation。 4 security securityConfirmation is the use of the force secret algorithm and the secondary and secondary As a result of the K UPenc calculation performed by the station, the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adding force completion message carries securityConfirmation, and the secondary base occupies 4 owing i'J securityConfirmation.
获取单元 22 , 用于根据基站衍生的密钥、 预设算法、 预设数据 以及校验信息获取目标数据。 The obtaining unit 22 is configured to acquire target data according to a key derived by the base station, a preset algorithm, preset data, and verification information.
示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用力口密算法和衍生的 与辅基站有关的 KUPenc对 securityConfirmationlnput 计算的结果, securityConfirmation 是添加到主基站发送给辅基站的基站添加完成 消息中, 辅基站接收到 securityConfirmation后根据加密算法和自身 衍生的 KUPen 对 securityConfirmation 进行解密计算得到新的 SecurityConfirmationlnpu Exemplarily, it is assumed that the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the calculation of the securityConfirmationlnput by the UE using the power secret algorithm and the derived KUPenc related to the secondary base station, and the securityConfirmation is added to the primary base station. The base station adds the completion message to the secondary base station. After receiving the securityConfirmation, the secondary base station decrypts the securityConfirmation according to the encryption algorithm and its own derived K UPen to obtain a new SecurityConfirmationInstance.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护 算 法 和 衍 生 的 与 辅 基 站 有 关 的 KUPint 或 者 KRRCint 对 securityConfirmationlnput计算的结果, securityConfirmation是添力口 到 UE 发 送 给辅 基 站 的 MAC 消 息 中 , 辅 基 站 接 收 到 securityConfirmation 后根据完整性保护算法和自身衍生的 KUPint或 者 KRRCint对自身保存的 securityConfirmationlnput进行完整性保护计 算得到新的 securityConfirmation。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint related to the security base station, and the securityConfirmationlnput, securityConfirmation In the MAC message sent by the UE to the secondary base station, the secondary base station receives the securityConfirmation and performs integrity protection calculation on the securityConfirmationlnput saved by the integrity protection algorithm and its own derived K UPint or K RRCint to obtain a new securityConfirmation.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息 UE使用力。密算法和 衍生的与辅基站有关的 KUPenc对 securityConfirmationlnput计算的结 果, securityConfirmation添加到 UE发送给辅基站的 PDCP数据中, 辅基站接收到 securityConfirmation 后根据加密算法和自身衍生的 KUPenc 对 校 验 信 息 进 行 解 密 计 算 得 到 新 的 SecurityConfirmationlnpu Or, exemplarily, it is assumed that the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is used by the UE. The secret algorithm and the derived K UPenc related to the secondary base station calculate the result of the securityConfirmationlnput, the securityConfirmation is added to the PDCP data sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation and then according to the encryption algorithm and the self-derived K UPenc pair check information. Perform a decryption calculation to get a new SecurityConfirmationlnpu
判断单元 23 , 用于根据预设数据、 校验信息以及目标数据判断 用户设备衍生的密钥与基站的衍生的密钥是否相同。 示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用完整性保护算法和 衍生的与辅基站有关的 KUPint对 securityConfirmationlnput计算的结 果, securityConfirmationlnput是 UE和辅基站均存储的一个辅基站 下的小区标识数据, 辅基站接收到 securityConfirmation后根据完整 性保护算法和自身衍生的 KUPint对 securityConfirmationlnput进行完 整 性 保 护 计 算 得 到 新 的 securityConfirmation , 判 断 新 的 securityConfirmation与接收到的 securityConfirmation是否相同 , 如 果相同则说明 UE衍生的与辅基站有关的 1„1111与辅基站自身衍生的 KUPin S同, 否则不相同。 The determining unit 23 is configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the derived key of the base station. Exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput. The verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station. The securityConfirmationlnput is the UE and the secondary base station. The cell identification data of a secondary base station is stored. After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K UPint to obtain a new securityConfirmation, and determines the new securityConfirmation and the received securityConfirmation. are the same, then the same as if a UE-derived "1111 to the secondary base station and the secondary base station itself associated with the derived K UPin S, or not identical.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护算法和衍生的与辅基站有关的 KRRCint对 securityConfirmationlnput 计算的结果, securityConfirmationlnput是 UE和辅基站均存储的一 个辅基站下的小区标识数据, 辅基站接收到 securityConfirmation后 根 据 完 整 性 保 护 算 法 和 自 身 衍 生 的 KRRCint 对 securityConfirmationlnput 进 行 完 整 性 保 护 计 算 得 到 新 的 securityConfirmation , 判断新的 securityConfirmation 与接^ L到的 securityConfirmation 是否相同, 如果相同则说明 UE 衍生的与辅基 站有关的 KRRCint与辅基站自身衍生的 KRRCint相同, 否则不相同。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the UE using the integrity protection algorithm and the derived K RRCint related to the security base station to calculate the securityConfirmationlnput, the securityConfirmationlnput is the UE and The secondary base station stores the cell identification data of a secondary base station. After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K RRCint to obtain a new securityConfirmation, and judges the new securityConfirmation and the connection. securityConfirmation to L is the same, if the same description of the same UE-derived K RRCint the secondary base station and the secondary base station associated derived K RRCint itself, or not identical.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护算法和衍生的与辅基站有关的 KUPint对 securityConfirmationlnput 完整性保护后得到中间变量 securityConfirmationTemp , 再使用加密 算法和衍生的与辅基站有关的 KUPenc securityConfirmationTem 力口 密后得 j securityConfirmation。 辅基 占接 ^L ^j securityConfirmation 后 , 首 先 辅 基 站 使 用 加 密 算 法 和 自 身 衍 生 的 KUPenc 对 securityConfirmation解密后得 i'j securityConfirmationTem , 再对自 身存储的 securityConfirmationlnput 使用完整性保护算法和衍生的 KUPint 完整性保护后得到新的 securityConfirmationTemp , 判断新的 securityConfirmationTem 与接 ^ $]] security Confirmation解密后得 到的 securityConfirmationTemp是否相同, 如果相同贝1 J说明 UE ^ [汙生 的与辅基站有关的 KUPenc、 KUPint与辅基站自身衍生的 KUPenc、 KUPint 对应相同, 否则不相同。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is that the UE uses the integrity protection algorithm and the derived KUPint related to the secondary base station to protect the securityConfirmationlnput integrity and obtain the intermediate variable securityConfirmationTemp. Then, using the encryption algorithm and the derived K UPenc securityConfirmationTem associated with the secondary base station, j securityConfirmation is obtained. After the secondary base occupies ^L ^j securityConfirmation, the secondary base station first uses the encryption algorithm and its own derived K UPenc to decrypt the securityConfirmation and obtains the i'j securityConfirmationTem, and then uses the integrity protection algorithm and derived for the securityConfirmationlnput stored by itself. K UPint the new integrity protection securityConfirmationTemp obtained, and then determining new securityConfirmationTem ^ $]] the decrypted security Confirmation securityConfirmationTemp are the same, the same as if the UE described shellfish 1 J ^ [raw sewage associated with secondary base station K UPenc K UPint is the same as K UPenc and K UPint derived from the secondary base station itself, otherwise it is different.
可选的, 如图 3所示, 该辅基站 20还包括: Optionally, as shown in FIG. 3, the secondary base station 20 further includes:
重置单元 24 , 用于若用户设备衍生的密钥与基站的衍生的密钥 不相同, 则使用户设备重新衍生密钥或使用户设备删除该基站。 The resetting unit 24 is configured to: if the key derived by the user equipment is different from the derived key of the base station, enable the user equipment to re-derivate the key or delete the base station by the user equipment.
示例性的,假设根据判断单元 23判断的结果为进行完整性保护 后得 i'J 新 security Confirmation与接 ^ i'J security Confirmation 不同, 则说明 UE衍生的与辅基站有关的 1^1111与辅基站自身衍生的 1^1111不相同, 那么, 辅基站可以通知 UE删除该辅基站或者使 UE 重新衍生与该辅基站相关的密钥。 Exemplarily, it is assumed that the result of the judgment by the judging unit 23 is that after the integrity protection is performed, the i'J new security Confirmation is different from the i iJ security Confirmation, and the UE-derived sub-base station is associated with the 1 ^ 1111 and the auxiliary. The base station itself is different from the 1st 1111. Then, the secondary base station can notify the UE to delete the secondary base station or cause the UE to re-derivate the key associated with the secondary base station.
本发明的实施例提供一种基站,接收用户设备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 预设算法包括加密算法、 完整性保护算 法中的至少一种; 根据基站衍生的密钥、 预设算法、 预设数据以及 校验信息获取目标数据; 根据预设数据、 校验信息以及目标数据判 断用户设备衍生的密钥与基站衍生的密钥是否相同。 能够校验用户 设备与辅基站之间的密钥是否正确, 可以避免由于密钥以及相应的 算法不正确而导致的用户设备与辅基站之间的业务中断。 The embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used. The method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the base station, a preset algorithm, preset data, and verification information; determining the user equipment according to the preset data, the verification information, and the target data; Whether the derived key is the same as the key derived by the base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例还提供一种基站 30 , 该基站 30 可以作为主基 站, 如图 4所示, 该主基站 30 包括: 接收单元 3 1、 获取单元 32、 判断单元 33和发送单元 34。 The embodiment of the present invention further provides a base station 30, which can serve as a primary base station. As shown in FIG. 4, the primary base station 30 includes: a receiving unit 3 1 , an obtaining unit 32, a determining unit 33, and a transmitting unit 34.
接收单元 3 1 , 用于接收用户设备发送的校验信息, 校验信息为 用户设备对预设数据通过用户设备衍生的密钥、 预设算法进行保护 后得到的信息, 预设算法包括加密算法、 完整性保护算法中的至少 一种。 The receiving unit 3 1 is configured to receive the verification information sent by the user equipment, where the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm includes an encryption algorithm. At least one of integrity protection algorithms.
具体的, 主基站接收 UE 发送的包含校验信息的无线资源控制 消息。 其中, 示例性的, 无线资源控制消息可以是 RRC Connection Reconfiguration Complete Message , 其中包含有校验信息。 Specifically, the primary base station receives the radio resource control that is sent by the UE and includes the verification information. Message. For example, the radio resource control message may be an RRC Connection Reconfiguration Complete Message, where the verification information is included.
可选的, 预设数据包括以下中的至少一种: Optionally, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
获取单元 32 , 用于根据辅基站衍生的密钥、 预设算法、 预设数 据以及校验信息获取目标数据。 The obtaining unit 32 is configured to acquire target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
示例性的, 主基站根据加密算法和辅基站衍生的 KUPenc (此处 的 KUPenc是由主基站使用与辅基站相同的密钥衍生过程得到 ) 来对 从接收单元 3 1接收到的校验信息进行解密获得目标数据。 Exemplarily, the primary base station performs the check received from the receiving unit 31 according to the encryption algorithm and the K UPenc derived from the secondary base station (where K UPenc is obtained by the primary base station using the same key derivation process as the secondary base station). The information is decrypted to obtain the target data.
判断单元 33 , 用于根据预设数据、 校验信息以及目标数据判断 用户设备衍生的密钥与辅基站的衍生的密钥是否相同, 得到判断结 果。 The determining unit 33 is configured to determine, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment and the derived key of the secondary base station are the same, and the judgment result is obtained.
示例性的, 假设目标数据是 UE 对预设数据使用用户设备衍生 的 KUPenc与加密算法保护后的数据, 目标数据为主基站根据加密算 法和辅基站衍生的 KUPem; (此处的 KUPem;是由主基站使用与辅基站相 同的密钥衍生过程得到 )来对从接收单元 3 1接收到的校验信息进行 解密得到的数据, 主基站判断目标数据与预设数据是否相同得到判 断结果。 Exemplarily, the target data is data that the UE protects the preset data by using the user equipment-derived K UPenc and the encryption algorithm, and the target data is K UPem derived from the primary base station according to the encryption algorithm and the secondary base station ; (K UPem here) ; is obtained from the primary base station uses the same key derivation process and the secondary base station) for data obtained by the decryption to check information received from the receiving unit 31 to the primary base station determines whether the target data with the preset data to get the same result of determination .
发送单元 34 , 用于将判断结果发送给辅基站。 The sending unit 34 is configured to send the determination result to the secondary base station.
示例性的, 主基站将判断结果通过 X2接口通知辅基站。 Exemplarily, the primary base station notifies the secondary base station of the determination result through the X2 interface.
可选的, 如图 5所示, 该主基站 30还包括: Optionally, as shown in FIG. 5, the primary base station 30 further includes:
重置单元 35 , 用于若用户设备衍生的密钥与辅基站的衍生的密 钥不相同, 则使用户设备删除辅基站或使用户设备重新衍生密钥。 The resetting unit 35 is configured to: if the key derived by the user equipment is different from the derived key of the secondary base station, enable the user equipment to delete the secondary base station or re-derivate the key by the user equipment.
本发明的实施例提供一种基站,接收用户设备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 预设算法包括加密算法、 完整性保护算 法中的至少一种; 根据辅基站衍生的密钥、 预设算法、 预设数据以 及校验信息获取目标数据; 根据预设数据、 校验信息以及目标数据 判断用户设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断 结果; 将判断结果发送给辅基站。 能够校验用户设备与辅基站之间 的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致 的用户设备与辅基站之间的业务中断。 An embodiment of the present invention provides a base station, which receives verification information sent by a user equipment, where the verification information is a key derived by the user equipment for the preset data by using the user equipment, and is preset. The information obtained by the method after the protection is performed, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; and the target data is obtained according to a key derived by the secondary base station, a preset algorithm, preset data, and verification information; The data, the verification information, and the target data are determined to determine whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the determination result is obtained; and the determination result is sent to the secondary base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例还提供一种用户设备 40 , 如图 6所示, 该用户 设备 40包括: 解密单元 41、 判断单元 42和发送单元 43。 The embodiment of the present invention further provides a user equipment 40. As shown in FIG. 6, the user equipment 40 includes: a decryption unit 41, a determination unit 42, and a transmission unit 43.
解密单元 41 , 用于根据用户设备衍生的密钥、 预设算法对接收 到的下行数据进行解密。 The decrypting unit 41 is configured to decrypt the received downlink data according to a key derived by the user equipment and a preset algorithm.
示例性的, 其中, 预设算法可以是加密算法, UE与辅基站之间 已经建立连接, UE根据自身衍生的密钥、 加密算法对从网络侧接收 到的加密的下行数据进行解密, 然后得到互联网协议 ( Internet Protocol , IP ) 才艮文。 Exemplarily, the preset algorithm may be an encryption algorithm, and a connection is established between the UE and the secondary base station, and the UE decrypts the encrypted downlink data received from the network side according to the key and encryption algorithm derived by the UE, and then obtains The Internet Protocol (IP) is the only one.
判断单元 42 , 用于根据解密后的数据判断用户设备衍生的密钥 与辅基站衍生的密钥是否相同。 The determining unit 42 is configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
具体的, 判断单元 42用于: Specifically, the determining unit 42 is configured to:
获取解密后的数据包的互联网协议地址和端口号; Obtaining the Internet Protocol address and port number of the decrypted data packet;
识别数据包的互联网协议地址和端口号; Identify the internet protocol address and port number of the data packet;
若可以识别互联网协议地址和端口号, 确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, If the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号, 确定用户设备衍生的 密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
示例性的, 判断单元 42从解密单元 41接收到 IP报文, 获取该 IP 文的 IP地址和端口号, 若可以识别该 IP地址与端口号则将该 IP报文发给对应的应用, 同时也说明 UE衍生的与辅基站相关的密 钥和辅基站衍生的相关的密钥是相同的; 或, Exemplarily, the determining unit 42 receives the IP packet from the decryption unit 41, and obtains the IP address and port number of the IP file. If the IP address and the port number can be identified, the IP packet is sent to the corresponding application, and It is also indicated that the UE-derived key associated with the secondary base station and the secondary base-derived related key are the same; or,
若无法识别该 IP地址和 /或端口号则 IP报文是错误包, 同时也 说明 UE 衍生的与辅基站相关的密钥和辅基站衍生的相关的密钥不 相同。 If the IP address and/or port number cannot be identified, the IP packet is an error packet and It is indicated that the UE-derived key associated with the secondary base station is different from the associated key derived by the secondary base station.
发送单元 43 , 用于向辅基站发送判断结果。 The sending unit 43 is configured to send a determination result to the secondary base station.
示例性的, UE通过主基站向辅基站发送判断单元 42得到的判 断结果。 Exemplarily, the UE sends the judgment result obtained by the determining unit 42 to the secondary base station through the primary base station.
可选的, 如图 7所示, 该用户设备 40还包括: Optionally, as shown in FIG. 7, the user equipment 40 further includes:
通知单元 44 , 用于若用户设备衍生的密钥与辅基站衍生的密钥 不相同, 通知主基站删除该辅基站; 或通知主基站重新添加该辅基 站; 或通过主基站通知该基站辅基站重新触发重配置流程; 或通过 主基站通知该辅基站删除该辅基站。 The notification unit 44 is configured to notify the primary base station to delete the secondary base station if the key derived by the user equipment is different from the key generated by the secondary base station, or notify the primary base station to re-add the secondary base station, or notify the base station of the secondary base station by using the primary base station. The reconfiguration process is re-triggered; or the secondary base station is notified by the primary base station to delete the secondary base station.
示例性的, 如果 UE 衍生的与辅基站相关的密钥与辅基站衍生 的相关的密钥不相同, 用户设备 40可以通知主基站添加的辅基站有 问题, 同时可以指示辅基站的哪个承载出了问题, 即在指示中携带 承载标识, 主基站确定该辅基站有问题后删除该辅基站或者使主基 站重新添加该辅基站; 或者用户设备 40还可以通过主基站通知该辅 基站重新触发重新配置与 UE的连接; 或用户设备 40通过主基站通 知该辅基站删除该辅基站。 Exemplarily, if the UE-derived key associated with the secondary base station is different from the secondary base-derived related key, the user equipment 40 may notify the primary base station that the secondary base station has a problem, and may indicate which bearer of the secondary base station is out. The problem is that the bearer identifier is carried in the indication, the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the user equipment 40 can notify the secondary base station to restart the re-trigger by the primary base station. The connection with the UE is configured; or the user equipment 40 notifies the secondary base station to delete the secondary base station by the primary base station.
本发明的实施例提供一种用户设备,根据用户设备衍生的密钥、 预设算法对接收到的下行数据进行解密; 根据解密后的数据判断用 户设备衍生的密钥与辅基站衍生的密钥是否相同; 向辅基站发送判 断结果。 能够校验用户设备与辅基站之间的密钥是否正确, 可以避 免由于密钥以及相应的算法不正确而导致的用户设备与辅基站之间 的业务中断。 An embodiment of the present invention provides a user equipment, which decrypts received downlink data according to a key derived by the user equipment and a preset algorithm, and determines, according to the decrypted data, a key derived by the user equipment and a key derived by the secondary base station. Whether they are the same; send the judgment result to the secondary base station. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例提供一种核心网网元 50 , 如图 8所示, 该核心 网网元 50 包括: An embodiment of the present invention provides a core network element 50. As shown in FIG. 8, the core network element 50 includes:
接收单元 5 1、 判断单元 52和发送单元 53。 The receiving unit 5 1, the judging unit 52, and the transmitting unit 53.
接收单元 5 1 , 用于接收辅基站根据辅基站衍生的密钥以及预设 算法对用户设备发送的上行数据进行解密后的数据。 The receiving unit 5 1 is configured to receive data that is decrypted by the secondary base station according to the key derived by the secondary base station and the uplink data sent by the user equipment according to a preset algorithm.
示例性的, 其中, 预设数据可以是加密算法, UE与辅基站之间 已经建立连接, 辅基站根据自身衍生的密钥、 加密算法对从 UE 接 收到的加密的上行数据进行解密得到互联网协议( Internet Protocol , IP )报文,将 IP报文发送给核心网网元则核心网网元接收到 IP报文。 Exemplarily, where the preset data may be an encryption algorithm between the UE and the secondary base station A connection has been established, and the secondary base station decrypts the encrypted uplink data received from the UE according to the key and encryption algorithm derived from the UE to obtain an Internet Protocol (IP) packet, and sends the IP packet to the core network element. The core network element receives the IP packet.
判断单元 52 , 用于根据解密后的数据判断用户设备衍生的密钥 与辅基站衍生的密钥是否相同。 The determining unit 52 is configured to determine, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
具体的, 判断单元 52用于: Specifically, the determining unit 52 is configured to:
获取解密后的数据包的互联网协议地址和端口号; Obtaining the Internet Protocol address and port number of the decrypted data packet;
识别数据包的互联网协议地址和端口号; Identify the internet protocol address and port number of the data packet;
若可以识别互联网协议地址和端口号则确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, If the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号则确定用户设备衍生 的密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the key derived by the user equipment is not the same as the key derived by the secondary base station.
示例性的, 判断单元 52从接收单元 51接收到 IP报文, 获取该 IP 文的 IP地址和端口号, 若可以识别该 IP地址与端口号则该 IP 报文正确, 同时也说明 UE 衍生的与辅基站相关的密钥和辅基站衍 生的相关的密钥是相同的; 或, Exemplarily, the determining unit 52 receives the IP packet from the receiving unit 51, and obtains the IP address and the port number of the IP file. If the IP address and the port number can be identified, the IP packet is correct, and the UE-derived The key associated with the secondary base station and the associated key derived by the secondary base station are the same; or,
若无法识别该 IP地址和 /或端口号则 IP报文是错误包, 同时也 说明 UE 衍生的与辅基站相关的密钥和辅基站衍生的相关的密钥不 相同。 If the IP address and/or port number cannot be identified, the IP packet is an error packet, and the UE-derived key associated with the secondary base station and the secondary base-derived related key are different.
可选的, 如图 9所示, 该核心网网元 50还包括: Optionally, as shown in FIG. 9, the core network element 50 further includes:
通知单元 54 , 用于若用户设备衍生的密钥与辅基站衍生的密钥 不相同, 核心网网元通知主基站删除该辅基站; 或核心网网元通知 主基站重新添加该辅基站; 或核心网网元通过主基站通知该辅基站 重新触发重配置流程; 或核心网网元通过主基站通知该辅基站删除 该辅基站。 The notification unit 54 is configured to: if the key derived by the user equipment is different from the key derived by the secondary base station, the core network element notifies the primary base station to delete the secondary base station; or the core network element notifies the primary base station to re-add the secondary base station; or The core network element notifies the secondary base station to re-trigger the reconfiguration process by the primary base station; or the core network element notifies the secondary base station to delete the secondary base station by the primary base station.
可选的, 通知单元 54可以具体用于: Optionally, the notification unit 54 can be specifically configured to:
向移动性管理实体发送密钥不相同的消息, 并由移动性管理实 体向主基站转发该密钥不相同的消息, 以使主基站收到该密钥不相 同得到消息后删除该辅基站或重新添加该辅基站; 或通过主基站通 知该辅基站重新触发重配置流程; 或通过主基站通知该辅基站删除 该辅基站。 Sending a message with a different key to the mobility management entity, and forwarding, by the mobility management entity, the message that the key is different from the primary base station, so that the primary base station receives the message after the key is different, and then deletes the secondary base station or Re-add the secondary base station; or pass the primary base station It is known that the secondary base station re-triggers the reconfiguration process; or the primary base station notifies the secondary base station to delete the secondary base station.
示例性的, 如果 UE 衍生的与辅基站相关的密钥与辅基站衍生 的相关的密钥不相同, 核心网网元 50可以通过 MME通知主基站或 直接通知主基站添加的辅基站有问题, 同时可以指示辅基站的哪个 承载出了问题, 即在指示中携带承载标识, 主基站确定该辅基站有 问题后删除该辅基站或者使主基站重新添加该辅基站; 或者核心网 网元 50还可以通知该辅基站重新触发重新配置与 UE的连接; 或核 心网网元 50通过主基站通知该辅基站删除该辅基站。 Exemplarily, if the UE-derived key associated with the secondary base station is different from the secondary base-derived related key, the core network element 50 may notify the primary base station through the MME or directly notify the primary base station that the secondary base station has a problem. At the same time, it may indicate that the bearer of the secondary base station has a problem, that is, the bearer identifier is carried in the indication, and the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the core network element 50 The secondary base station may be notified to re-trigger the reconfiguration of the connection with the UE; or the core network element 50 notifies the secondary base station to delete the secondary base station by the primary base station.
本发明的实施例提供一种核心网网元, 接收基站根据基站衍生 的密钥以及预设算法对用户设备发送的上行数据进行解密后的数 据; 根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的密 钥是否相同; 向辅基站发送判断的结果。 能够校验用户设备与辅基 站之间的密钥是否正确, 可以避免由于密钥以及相应的算法不正确 而导致的用户设备与辅基站之间的业务中断。 An embodiment of the present invention provides a core network element, where the receiving base station decrypts the uplink data sent by the user equipment according to the key derived by the base station and a preset algorithm; and determines the key derived by the user equipment according to the decrypted data. Whether the key derived from the secondary base station is the same; the result of the judgment is sent to the secondary base station. It is possible to verify that the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例提供一种校验密钥的方法, 基于辅基站, 如图 10所示, 该方法包括: An embodiment of the present invention provides a method for verifying a key. Based on the secondary base station, as shown in FIG. 10, the method includes:
5 101、 辅基站接收用户设备发送的校验信息。 5 101. The secondary base station receives the verification information sent by the user equipment.
其中, 校验信息为用户设备对预设数据通过用户设备衍生的密 钥、 预设算法进行保护后得到的信息, 预设算法包括加密算法、 完 整性保护算法中的至少一种。 The verification information is obtained by the user equipment, and the preset data includes at least one of an encryption algorithm and a integrity protection algorithm.
5 102、 辅基站根据辅基站自身衍生的密钥、 预设算法、 预设数 据以及校验信息获取目标数据。 5 102. The secondary base station acquires the target data according to the key, the preset algorithm, the preset data, and the verification information derived by the secondary base station.
5 103、 辅基站根据预设数据、 校验信息以及目标数据判断用户 设备衍生的密钥与辅基站衍生的密钥是否相同。 5: The secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
本发明的实施例提供一种校验密钥的方法, 辅基站接收用户设 备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备 衍生的密钥、 预设算法进行保护后得到的信息, 预设算法包括加密 算法、 完整性保护算法中的至少一种; 辅基站根据辅基站自身衍生 的密钥、 预设算法、 预设数据以及校验信息获取目标数据; 辅基站 根据预设数据、 校验信息以及目标数据判断用户设备衍生的密钥与 辅基站自身衍生的密钥是否相同。 能够校验用户设备与辅基站之间 的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致 的用户设备与辅基站之间的业务中断。 An embodiment of the present invention provides a method for verifying a key. The secondary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm. The obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; the secondary base station is derived from the secondary base station itself The key, the preset algorithm, the preset data, and the verification information acquire the target data; the secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station itself. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
为了使本领域技术人员能够更清楚地理解本发明实施例提供的 技术方案, 下面通过具体的实施例, 对本发明的实施例提供基于辅 基站的校验密钥的方法进行详细说明, 如图 1 1 所示, 该方法包括: In order to enable a person skilled in the art to more clearly understand the technical solution provided by the embodiment of the present invention, a method for providing a verification key based on a secondary base station according to an embodiment of the present invention is described in detail below by using a specific embodiment, as shown in FIG. 1 . As shown in 1, the method includes:
S201、 辅基站接收用户设备发送的校验信息。 S201. The secondary base station receives the verification information sent by the user equipment.
其中, 校验信息为用户设备对预设数据通过用户设备衍生的密 钥、 加密算法和 /或完整性保护算法进行保护后得到的信息。 The verification information is information obtained by the user equipment after the preset data is protected by the user-derived key, encryption algorithm, and/or integrity protection algorithm.
预设数据包括以下中的至少一种: The preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
具体的, 辅基站通过 X2接口从主基站接收基站添加完成消息 , 基站添加完成消息携带校验信息; 或 Specifically, the secondary base station receives the base station addition completion message from the primary base station by using the X2 interface, and the base station addition completion message carries the verification information; or
辅基站接收用户设备发送的媒体接入控制消息, 媒体接入控制 消息携带校验信息; 或 The secondary base station receives the media access control message sent by the user equipment, where the media access control message carries the verification information; or
接收用户设备发送的分组包汇聚协议数据, 分组包汇聚协议数 据携带所述校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, the packet packet convergence protocol data carrying the verification information.
示例性的, 校验信息是可以包含在 UE 向主基站发送的 RRC Connection Reconfiguration Complete Message中 , 主基站接收到该校验 信息后向辅基站发送基站添加完成消息中携带该校验信息。 For example, the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station. After receiving the verification information, the primary base station sends the verification information to the secondary base station to send the verification information to the secondary base station.
具体的, 在无线资源连接重配置完成消息中携带校验信息可以 通过增力口 securityConfirmation来实现。 示例性的, 可以通过以下代 码实现: RRC Connection Reconfiguration Complete Message Specifically, carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding a security interface securityConfirmation. For example, it can be implemented by the following code: RRC Connection Reconfiguration Complete Message
- ASN 1 START - ASN 1 START
RRCConnectionReconfigurationComplete : := SEQUENCE { rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE { RRCConnectionReconfigurationComplete : := SEQUENCE { rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE {
rrcConnectionReconfigurationComplete-r8 rrcConnectionReconfigurationComplete-r8
RRCConnectionReconfigurationComplete-r8-IEs, RRCConnectionReconfigurationComplete-r8-IEs,
criticalExtensionsFuture SEQUENCE { } criticalExtensionsFuture SEQUENCE { }
} }
} }
RRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCERRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCE
{ {
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-v8aO-IEs : :=RRCConnectionReconfigurationComplete-v8aO-IEs : :=
SEQUENCE { SEQUENCE {
lateNonCriticalExtension OCTET STRING lateNonCriticalExtension OCTET STRING
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v l 020-IEs OPTIONAL } RRCConnectionReconfigurationComplete-v l 020-IEs OPTIONAL }
RRCConnectionReconfigurationComplete-v l 020-IEs : :=RRCConnectionReconfigurationComplete-v l 020-IEs : :=
SEQUENCE { rlf-InfoAvailable-rlO ENUMERATED {true}SEQUENCE { rlf-InfoAvailable-rlO ENUMERATED {true}
OPTIONAL, OPTIONAL,
logMeasAvailable-rlO ENUMERATED {true} logMeasAvailable-rlO ENUMERATED {true}
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-vll 30-IEs OPTIONAL RRCConnectionReconfigurationComplete-vll 30-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-vl 130-IEs : :=RRCConnectionReconfigurationComplete-vl 130-IEs : :=
SEQUENCE { SEQUENCE {
connEstFaillnfoAvailable-rl 1 ENUMERATED {true} connEstFaillnfoAvailable-rl 1 ENUMERATED {true}
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-vl2xx-IEs RRCConnectionReconfigurationComplete-vl2xx-IEs
OPTIONAL OPTIONAL
} }
RRCConnectionReconfigurationComplete-vl2xx-IEs : SEQUENCE { RRCConnectionReconfigurationComplete-vl2xx-IEs : SEQUENCE {
securityConfirmation OCTET STRING securityConfirmation OCTET STRING
OPTIONAL, OPTIONAL,
nonCriticalExtension SEQUENCE {} nonCriticalExtension SEQUENCE {}
OPTIONAL OPTIONAL
} }
- ASNISTOP - ASNISTOP
其中 Security Confirmation 可以为 OCTET STRING 或者 BIT STRING (SIZE (xx)的形式等。 The Security Confirmation can be in the form of OCTET STRING or BIT STRING (SIZE (xx).
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: SEQUENCE { cellldentity Cellldentity: physCellld PhysCellld c-RNTI C-RNTI Exemplarily, selecting the preset data in securityConfirmation can be passed The following code is implemented: SEQUENCE { cellldentity Cellldentity : physCellld PhysCellld c-RNTI C-RNTI
- ASN 1 STOP - ASN 1 STOP
其 中 UE 产 生 securityConfirmation , 可 以 是 对 securityConfirmationlnput使用完整性保护算法以及完整性保护算法 的 密 钥 计 算 的 完 整 性 保 护 结 果 ; 也 可 以 是 对 securityConfirmationlnput使用力口密算法以及力口密算法的密钥计算的 加密的结果; 或者是两者的组合。 The UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
4叚设 securityConfirmation是 UE使用力口密算法和^汙生的与辅基 站有关的 KUPenc计算的结果,主基站通过 X2接口向辅基站发送基站 添力口完成消息, 其中基站添力口完成消息携带 securityConfirmation , 辅基 占接 4欠 i'J securityConfirmation。 4. The securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message. Carrying securityConfirmation, the sub-base 4 owes i'J securityConfirmation.
或者, 示例性的, 如果校验信息是包含在用户设备发送的 MAC 消息中, 具体可以通过在 MAC 消息中增力口 securityConfirmation来 实现。 Or, exemplarily, if the verification information is included in the MAC message sent by the user equipment, specifically by adding a securityConfirmation in the MAC message.
例 如 , 可 以 新 引 入 一 个 LCID 值 专 门 表 示 是 securityConfirmation , 比 如 使 用 0101 1 , 其 中 L 表 示 securityConfirmation的长度, 这里面 ^口果 securityConfirmation是固 定长度的, 可以没有 L , 直接放入 securityConfirmation。 也可以重 用 目前的 LCID值,将 securityConfirmation加到现有的 MAC消息中 或者还可以由 UE直接将 securityConfirmation 当成数据传输或者通 过物理层传输。 示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: For example, a new LCID value can be newly introduced to represent securityConfirmation, for example, using 0101 1 , where L is the length of the securityConfirmation, where the securityConfirmation is a fixed length, and can be directly placed into the securityConfirmation without L. The current LCID value can also be reused, the securityConfirmation can be added to the existing MAC message or the securityConfirmation can be directly transmitted by the UE as data transmission or through the physical layer. Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code:
securityConfirmationlnput:: SEQUENCE { cellldentity Cellldentity, securityConfirmationlnput:: SEQUENCE { cellldentity Cellldentity,
physCellld PhysCellld physCellld PhysCellld
c-RNTI C-RNTI c-RNTI C-RNTI
- ASN 1 STOP - ASN 1 STOP
其 中 UE 产 生 securityConfirmation , 可 以 是 对 securityConfirmationlnput使用完整性保护算法以及完整性保护算法 的 密 钥 计 算 的 完 整 性 保 护 结 果 ; 也 可 以 是 对 securityConfirmationlnput使用力口密算法以及力口密算法的密钥计算的 加密的结果; 或者是两者的组合。 The UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
假设 securityConfirmation是 UE使用完整性保护算法和衍生的 与辅基站有关的 KUPint或者 KRRCint计算的结果, securityConfirmation 是添加到 UE 发送给辅基站的 MAC 消息中的, 辅基站接收到 securityConfirmation。 It is assumed that securityConfirmation is the result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint calculation related to the secondary base station, and the securityConfirmation is added to the MAC message sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation.
或者, 校验信息还可以包含在用户设备发送的分组包汇聚协议 ( Packet Data Convergence Protocol , PDCP ) 数据中。 Alternatively, the verification information may also be included in Packet Data Convergence Protocol (PDCP) data sent by the user equipment.
示例性的, 校验信息可以是 securityConfirmation , UE 产生 securityConfirmation , 可以是对 securityConfirmationlnput使用: ¾整 性保护算法以及完整性保护算法的密钥计算的完整性保护结果; 也 可以是对 securityConfirmationlnput使用力口密算法以及力口密算法的密 钥计算的加密的结果; 或者是两者的组合。 Exemplarily, the verification information may be a securityConfirmation, and the UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the securityConfirmationlnput: 3⁄4 integrity protection algorithm and the integrity protection algorithm; or may be a security secret to the securityConfirmationlnput The algorithm and the result of the encryption of the key calculation of the force-to-mouth algorithm; or a combination of the two.
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code:
securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity, securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity,
physCellld PhysCellld, c-RNTI C-RNTI physCellld PhysCellld, c-RNTI C-RNTI
- ASN 1 STOP - ASN 1 STOP
4叚设 securityConfirmation是 UE使用力口密算法和^汙生的与辅基 站有关的 KUPenc计算的结果,主基站通过 X2接口向辅基站发送基站 添力口完成消息, 其中基站添力口完成消息携带 securityConfirmation , 辅基 占接 4欠 i'J securityConfirmation。 4. The securityConfirmation is the result of the K UPenc calculation performed by the UE using the force-to-sense algorithm and the secondary base station, and the primary base station sends a base station adding force completion message to the secondary base station through the X2 interface, wherein the base station adds a force completion message. Carrying securityConfirmation, the sub-base 4 owes i'J securityConfirmation.
S202、 辅基站根据辅基站自身衍生的密钥、 预设算法、 预设数 据以及校验信息获取目标数据。 S202. The secondary base station acquires target data according to a key, a preset algorithm, preset data, and check information derived by the secondary base station.
示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用力口密算法和衍生的 与辅基站有关的 KUPenc对 securityConfirmationlnput 计算的结果, securityConfirmation 是添加到主基站发送给辅基站的基站添加完成 消息中, 辅基站接收到 securityConfirmation后根据加密算法和自身 衍生的 KUPenc 对 securityConfirmation 进行解密计算得到新的 SecurityConfirmationlnpu Exemplarily, it is assumed that the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the calculation of the securityConfirmationlnput by the UE using the power secret algorithm and the derived KUPenc related to the secondary base station, and the securityConfirmation is added to the primary base station. The base station adds the completion message to the secondary base station. After receiving the securityConfirmation, the secondary base station decrypts the securityConfirmation according to the encryption algorithm and its own derived K UPenc to obtain a new SecurityConfirmationInstance.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护 算 法 和 衍 生 的 与 辅 基 站 有 关 的 KUPint 或 者 KRRCint 对 securityConfirmationlnput计算的结果, securityConfirmation是添力口 到 UE 发 送 给辅 基 站 的 MAC 消 息 中 , 辅 基 站 接 收 到 securityConfirmation 后根据完整性保护算法和自身衍生的 KUPint或 者 KRRCint对自身保存的 securityConfirmationlnput进行完整性保护计 算得到新的 securityConfirmation。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint or K RRCint related to the security base station, and the securityConfirmationlnput, securityConfirmation In the MAC message sent by the UE to the secondary base station, the secondary base station receives the securityConfirmation and performs integrity protection calculation on the securityConfirmationlnput saved by the integrity protection algorithm and its own derived K UPint or K RRCint to obtain a new securityConfirmation.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息 UE使用力。密算法和 衍生的与辅基站有关的 KUPenc对 securityConfirmationlnput计算的结 果, securityConfirmation添加到 UE发送给辅基站的 PDCP数据中, 辅基站接收到 securityConfirmation 后根据加密算法和自身衍生的 KUPenc校验信息进行解密计算得到新的 SecurityConfirmationlnput。Or, exemplarily, it is assumed that the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is used by the UE. The secret algorithm and the derived K UPenc related to the secondary base station calculate the result of the securityConfirmationlnput, the securityConfirmation is added to the PDCP data sent by the UE to the secondary base station, and the secondary base station receives the securityConfirmation and derives according to the encryption algorithm and itself. The K UPenc checksum is decrypted to obtain a new SecurityConfirmationlnput.
S203、 辅基站根据预设数据、 校验信息以及目标数据判断用户 设备衍生的密钥与辅基站自身衍生的密钥是否相同。 S203. The secondary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station itself.
示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用完整性保护算法和 衍生的与辅基站有关的 KUPint对 securityConfirmationlnput计算的结 果, securityConfirmationlnput是 UE和辅基站均存储的一个辅基站 下的小区标识数据, 辅基站接收到 securityConfirmation后根据完整 性保护算法和自身衍生的 KUPint对 securityConfirmationlnput进行解 完 整性保护 计 算得 到 新 的 securityConfirmation , 判 断 新 的 securityConfirmation与接收到的 securityConfirmation是否相同 , 如 果是则说明 UE 衍生的与辅基站有关的 KUPint与辅基站自身衍生的 KUPin S同, 否则不相同。 Exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput. The verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station. The securityConfirmationlnput is the UE and the secondary base station. The cell identification data of one secondary base station is stored, and after receiving the securityConfirmation, the secondary base station performs a complete securityConfirmation on the securityConfirmationlnput according to the integrity protection algorithm and the self-derived K UPint to obtain a new securityConfirmation, and determines the new securityConfirmation and the received Whether the securityConfirmation is the same, if it is, it indicates that the UE-derived K UPint related to the secondary base station is the same as the K UPin S derived by the secondary base station itself, otherwise it is different.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护算法和衍生的与辅基站有关的 KRRCint对 securityConfirmationlnput 计算的结果, securityConfirmationlnput是 UE和辅基站均存储的一 个辅基站下的小区标识数据, 辅基站接收到 securityConfirmation后 根 据 完 整 性 保 护 算 法 和 自 身 衍 生 的 KRRCint 对 securityConfirmationlnput 进 行 完 整 性 保 护 计 算 得 到 新 的 securityConfirmation , 判断新的 securityConfirmation 与接^ L到的 securityConfirmation 是否相同, 如果相同则说明 UE 衍生的与辅基 站有关的 KRRCint与辅基站自身衍生的 KRRCint相同, 否则不相同。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the UE using the integrity protection algorithm and the derived K RRCint related to the security base station to calculate the securityConfirmationlnput, the securityConfirmationlnput is the UE and The secondary base station stores the cell identification data of a secondary base station. After receiving the securityConfirmation, the secondary base station performs a security protection calculation on the securityConfirmationlnput according to the integrity protection algorithm and its own derived K RRCint to obtain a new securityConfirmation, and judges the new securityConfirmation and the connection. securityConfirmation to L is the same, if the same description of the same UE-derived K RRCint the secondary base station and the secondary base station associated derived K RRCint itself, or not identical.
或者, 示例性的, 假设校验信息是 securityConfirmation , 预设 数据为 securityConfirmationlnput , 该校验信息是 UE使用完整性保 护算法和衍生的与辅基站有关的 KUPint对 securityConfirmationlnput 完整性保护后得到中间变量 securityConfirmationTemp , 再使用加密 算法和衍生的与辅基站有关的 KUPenc securityConfirmationTem 力口 密后得 j securityConfirmation。 辅基 占接 ^L ^j securityConfirmation 后 , 首 先 辅 基 站 使 用 加 密 算 法 和 自 身 衍 生 的 KUPenc 对 securityConfirmation解密后得 i'j securityConfirmationTem , 再对自 身存储的 securityConfirmationlnput 使用完整性保护算法和衍生的 KUPint 完整性保护后得到新的 securityConfirmationTemp , 判断新的 securityConfirmationTem 与接 ^ i'J securityConfirmation解密后得 到的 securityConfirmationTemp是否相同, 如果相同贝1 J说明 UE ^ [汙生 的与辅基站有关的 KUPenc、 KUPint与辅基站自身衍生的 KUPenc、 KUPint 对应相同, 否则不相同。 Or, exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is that the UE uses the integrity protection algorithm and the derived KUPint related to the secondary base station to protect the securityConfirmationlnput integrity and obtain the intermediate variable securityConfirmationTemp. Then, using the encryption algorithm and the derived K UPenc securityConfirmationTem associated with the secondary base station, j securityConfirmation is obtained. Auxiliary base occupation ^L ^j securityConfirmation After that, the secondary base station uses the encryption algorithm and its own derived K UPenc to decrypt the securityConfirmation and obtain the i'j securityConfirmationTem, and then uses the integrity protection algorithm and the derived K UPint integrity protection for the stored securityConfirmationlnput to obtain a new securityConfirmationTemp. new securityConfirmationTem ^ are the same and the ground i'J securityConfirmation obtained decrypted securityConfirmationTemp, if the same shellfish described the UE 1 J ^ [associated with secondary base station K UPenc raw sewage, K UPint to the secondary station itself derived K UPenc, K UPint corresponds to the same, otherwise it is not the same.
S204、若用户设备衍生的密钥与辅基站自身衍生的密钥不相同, 则辅基站使用户设备删除该辅基站或使用户设备重新衍生密钥。 S204. If the key derived by the user equipment is different from the key derived by the secondary base station, the secondary base station causes the user equipment to delete the secondary base station or re-derivate the key.
示例性的,假设根据步骤 S203判断的结果为通过完整性保护得 i'J r securityConfirmation 与接 securityConfirmation 不 同, 则说明 UE 衍生的与辅基站有关的 KUPint与辅基站自身衍生的 1^1111不相同, 那么, 辅基站可以通知 UE删除该辅基站或者使 UE 重新衍生与该辅基站相关的密钥。 Exemplarily, it is assumed that the result of the step S203 is that the integrity protection i'J r securityConfirmation is different from the securityConfirmation, indicating that the UE-derived K UPint related to the secondary base station is different from the secondary base station derived 1^ 1111. Then, the secondary base station may notify the UE to delete the secondary base station or cause the UE to re-derived the key associated with the secondary base station.
本发明的实施例提供一种校验密钥的方法, 辅基站接收用户设 备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备 衍生的密钥、 预设算法进行保护后得到的信息, 预设算法包括加密 算法、 完整性保护算法中的至少一种; 辅基站根据辅基站自身衍生 的密钥、 预设算法、 预设数据以及校验信息获取目标数据; 辅基站 根据预设数据、 校验信息以及目标数据判断用户设备衍生的密钥与 辅基站自身衍生的密钥是否相同。 能够校验用户设备与辅基站之间 的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致 的用户设备与辅基站之间的业务中断。 An embodiment of the present invention provides a method for verifying a key. The secondary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm. The obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; the secondary base station acquires target data according to a key derived by the secondary base station itself, a preset algorithm, preset data, and check information; The preset data, the verification information, and the target data determine whether the key derived by the user equipment is the same as the key derived by the secondary base station itself. It is possible to check whether the key between the user equipment and the secondary base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例提供一种校验密钥的方法, 基于主基站, 如图 12所示, 该方法包括: An embodiment of the present invention provides a method for verifying a key. Based on a primary base station, as shown in FIG. 12, the method includes:
S301、 主基站接收用户设备发送的校验信息。 S301. The primary base station receives the verification information sent by the user equipment.
其中, 校验信息为用户设备对预设数据通过用户设备衍生的密 钥、 预设算法进行保护后得到的信息, 预设算法包括加密算法、 完 整性保护算法中的至少一种。 The verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm. At least one of the integrity protection algorithms.
5302、 主基站根据辅基站衍生的密钥、 预设算法、 预设数据以 及校验信息获取目标数据。 S302. The primary base station acquires target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
5303、 主基站根据预设数据、 校验信息以及目标数据判断用户 设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断结果。 5303. The primary base station determines, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the determination result is obtained.
5304、 主基站将判断结果发送给辅基站。 5304. The primary base station sends the determination result to the secondary base station.
本发明的实施例提供一种校验密钥的方法, 主基站接收用户设 备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备 衍生的密钥、 预设算法进行保护后得到的信息, 预设算法包括加密 算法、 完整性保护算法中的至少一种; 主基站根据辅基站衍生的密 钥、 预设算法、 预设数据以及校验信息获取目标数据; 主基站根据 预设数据、 校验信息以及目标数据判断用户设备衍生的密钥与辅基 站衍生的密钥是否相同, 得到判断结果; 主基站将判断结果发送给 辅基站。 能够校验用户设备与辅基站之间的密钥是否正确, 可以避 免由于密钥以及相应的算法不正确而导致的用户设备与辅基站之间 的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key. The primary base station receives the verification information sent by the user equipment, and the verification information is that the user equipment protects the preset data by using a key derived by the user equipment and a preset algorithm. The obtained information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; the primary base station acquires target data according to a key derived from the secondary base station, a preset algorithm, preset data, and check information; The data, the verification information, and the target data are determined to determine whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained; the primary base station sends the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
为了使本领域技术人员能够更清楚地理解本发明实施例提供的 技术方案, 下面通过具体的实施例, 对本发明的实施例提供基于主 基站的校验密钥的方法进行详细说明, 如图 13所示, 该方法包括: In order to enable a person skilled in the art to more clearly understand the technical solution provided by the embodiment of the present invention, a method for providing a verification key based on a primary base station according to an embodiment of the present invention is described in detail below by using a specific embodiment, as shown in FIG. As shown, the method includes:
S401、 主基站接收用户设备发送的校验信息。 S401. The primary base station receives the verification information sent by the user equipment.
其中, 校验信息为用户设备对预设数据通过用户设备衍生的密 钥、 预设算法进行保护后得到的信息, 预设算法包括加密算法、 完 整性保护算法中的至少一种。 The verification information is obtained by the user equipment, and the preset data includes at least one of an encryption algorithm and a integrity protection algorithm.
预设数据包括以下中的至少一种: The preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 具体的, 主基站接收 UE 发送的包含校验信息的无线资源控制 消息。 其中, 示例性的, 无线资源控制消息可以是 RRC Connection Reconfiguration Complete Message , 其中包含有校验信息。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers. Specifically, the primary base station receives the radio resource control message that is sent by the UE and includes the verification information. For example, the radio resource control message may be an RRC Connection Reconfiguration Complete Message, where the verification information is included.
示例性的, 校验信息是可以包含 UE 向主基站发送的 RRC Connection Reconfiguration Complete Message中 , 主基站接收到该校验 信息后向辅基站发送基站添加完成消息中携带该校验信息。 For example, the verification information may be included in the RRC Connection Reconfiguration Complete message sent by the UE to the primary base station. After receiving the verification information, the primary base station sends the verification information to the secondary base station to send the verification information to the secondary base station.
具体的, 在无线资源连接重配置完成消息中携带校验信息可以 通过增力口 securityConfirmation来实现。 Specifically, carrying the verification information in the radio resource connection reconfiguration complete message may be implemented by adding a security interface.
示例性的, 可以通过以下代码实现: For example, it can be implemented by the following code:
RRC Connection Reconfiguration Complete Message RRC Connection Reconfiguration Complete Message
-- ASN 1 START -- ASN 1 START
RRCConnectionReconfigurationComplete : := SEQUENCE { rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE { RRCConnectionReconfigurationComplete : := SEQUENCE { rrc-Transactionldentifier RRC-Transactionldentifier, criticalExtensions CHOICE {
rrcConnectionReconfigurationComplete-r8 rrcConnectionReconfigurationComplete-r8
RRCConnectionReconfigurationComplete-r8-IEs, RRCConnectionReconfigurationComplete-r8-IEs,
criticalExtensionsFuture SEQUENCE { } criticalExtensionsFuture SEQUENCE { }
} }
} }
RRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCERRCConnectionReconfigurationComplete-r8-IEs : := SEQUENCE
{ {
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL RRCConnectionReconfigurationComplete-v8aO-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-v8aO-IEs : :二 SEQUENCE { RRCConnectionReconfigurationComplete-v8aO-IEs : : 2 SEQUENCE {
lateNonCriticalExtension OCTET STRING lateNonCriticalExtension OCTET STRING
OPTIONAL, OPTIONAL,
nonCriticalEx tension nonCriticalEx tension
RRCConnectionReconfigurationComplete-vl020-IEs OPTIONAL RRCConnectionReconfigurationComplete-vl020-IEs OPTIONAL
} CConnection econfigurationComplete-vl020-IEs SEQUENCE { } CConnection econfigurationComplete-vl020-IEs SEQUENCE {
rlf-InfoAvailable-rlO ENUMERATED {true} rlf-InfoAvailable-rlO ENUMERATED {true}
OPTIONAL, OPTIONAL,
logMeasAvailable-rlO ENUMERATED {true} logMeasAvailable-rlO ENUMERATED {true}
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-vll30-IEs OPTIONAL RRCConnectionReconfigurationComplete-vll30-IEs OPTIONAL
} }
RRCConnectionReconfigurationComplete-vl 130-IEs RRCConnectionReconfigurationComplete-vl 130-IEs
SEQUENCE { SEQUENCE {
connEstFaillnfoAvailable-rl 1 ENUMERATED {true} connEstFaillnfoAvailable-rl 1 ENUMERATED {true}
OPTIONAL, OPTIONAL,
nonCriticalExtension nonCriticalExtension
RRCConnectionReconfigurationComplete-vl2xx-IEs RRCConnectionReconfigurationComplete-vl2xx-IEs
OPTIONAL OPTIONAL
} }
RRCConnection econfigurationComplete-vl2xx-IEs RRCConnection econfigurationComplete-vl2xx-IEs
SEQUENCE { SEQUENCE {
securityConfirmation OCTET STRING OPTIONAL securityConfirmation OCTET STRING OPTIONAL
nonCriticalExtension SEQUENCE { } nonCriticalExtension SEQUENCE { }
OPTIONAL OPTIONAL
} }
- ASN 1 STOP - ASN 1 STOP
其中 Security Confirmation可以为 OCTET STRING ) 或者 BIT STRING (SIZE (xx)的形式等。 The Security Confirmation can be in the form of OCTET STRING or BIT STRING (SIZE (xx).
示例性的, 选择 securityConfirmation中的预设数据可以通过以 下代码实现: securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity, physCellld PhysCellld, c-RNTI C-RNTI Exemplarily, selecting the preset data in securityConfirmation can be implemented by the following code: securityConfirmationlnput: := SEQUENCE { cellldentity Cellldentity, physCellld PhysCellld, c-RNTI C-RNTI
} }
- ASN 1 STOP - ASN 1 STOP
其 中 UE 产 生 securityConfirmation , 可 以 是 对 securityConfirmationlnput使用完整性保护算法以及完整性保护算法 的 密 钥 计 算 的 完 整 性 保 护 结 果 ; 也 可 以 是 对 securityConfirmationlnput使用力口密算法以及力口密算法的密钥计算的 加密的结果; 或者是两者的组合。 The UE generates a securityConfirmation, which may be an integrity protection result of the key calculation used by the security protection algorithm and the integrity protection algorithm of the securityConfirmationlnput; or may be the encryption of the security secret algorithm and the key calculation of the force secret algorithm. The result; or a combination of the two.
4叚设 securityConfirmation是 UE使用力口密算法和^汙生的与辅基 站有关的 KUPenc 计算的结果, UE 向主基站发送 RRC Connection Reconfiguration Complete Message , 其中 RRC Connection Reconfiguration Complete Message 携 带 securityConfirmation , 主基 站 接 收 到 securityConfirmation。 5402、 主基站根据辅基站衍生的密钥、 预设算法、 预设数据以 及校验信息获取目标数据。 4 security securityConfirmation is the result of the K UPenc calculation performed by the UE using the power secret algorithm and the secondary base station, and the UE sends an RRC Connection Reconfiguration Complete Message to the primary base station, where the RRC Connection Reconfiguration Complete Message carries the securityConfirmation, and the primary base station receives Go to securityConfirmation. S402. The primary base station acquires target data according to a key derived by the secondary base station, a preset algorithm, preset data, and check information.
示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用完整性保护算法和 衍生的与辅基站有关的 KUPint对 securityConfirmationlnput计算的结 果, securityConfirmation 是添力口到 UE 发送给主基站的 RRC Connection Reconfiguration Complete Message 中 , 主基站接收到 securityConfirmation 后根据完整性保护算法和辅基站自身衍生的 KUPint (此处的 KUPint是由主基站使用与辅基站相同的密钥衍生过程 得到 ) 对 securityConfirmationlnput 进行完整性保护得到新的 securityConfirmation。 Exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput, and the verification information is a result of the UE using the integrity protection algorithm and the derived K UPint related to the secondary base station to calculate the securityConfirmationlnput, the securityConfirmation is In the RRC Connection Reconfiguration Complete Message sent by the UE to the primary base station, the primary base station receives the securityConfirmation according to the integrity protection algorithm and the K UPint derived from the secondary base station itself (where K UPint is used by the primary base station to use the same key as the secondary base station) The derived process gets) The integrity protection of securityConfirmationlnput gets a new securityConfirmation.
5403、 主基站根据预设数据、 目标数据以及校验信息判断用户 设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断结果。 The primary base station determines, according to the preset data, the target data, and the check information, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
示例性的, 假设校验信息是 securityConfirmation , 预设数据为 securityConfirmationlnput ,该校验信息是 UE使用完整性保护算法和 衍生的与辅基站有关的 KUPint对 securityConfirmationlnput计算的结 果, securityConfirmationlnput是 UE和辅基站均存储的一个辅基站 下的小区标识数据, 主基站接收到 securityConfirmation后根据完整 性保护算法和辅基站自身衍生的 KUPint (此处 !^^^是由主基站使用 与辅基站相同的密钥衍生过程得到)对 securityConfirmationlnput 进 行完整性保护计算得到新的 securityConfirmation , 判 断新的 securityConfirmation与接收到的 securityConfirmation 是否相同 , 如 果相同则说明 UE衍生的与辅基站有关的 1„1111与辅基站自身衍生的 KUPin S同, 否则不相同。 Exemplarily, the verification information is securityConfirmation, and the preset data is securityConfirmationlnput. The verification information is the result of the UE using the integrity protection algorithm and the derived K UPint related to the security base station. The securityConfirmationlnput is the UE and the secondary base station. The cell identification data of one secondary base station is stored. After receiving the securityConfirmation, the primary base station uses the KUPint derived from the integrity protection algorithm and the secondary base station itself (here! ^^^ is the same key used by the primary base station as the secondary base station) The derivation process obtains a security protection for the securityConfirmationlnput to obtain a new securityConfirmation, and judges whether the new securityConfirmation is the same as the received securityConfirmation. If they are the same, the UE-derived sub-base station-related 1 -1111 and the secondary base station-derived K are derived. UPin S is the same, otherwise it is not the same.
5404、 主基站将判断结果发送给辅基站。 S404. The primary base station sends the determination result to the secondary base station.
示例性的, 主基站将步骤 S303判断的结果通过 X2接口发送给 辅基站。 Exemplarily, the primary base station sends the result of the step S303 to the secondary base station through the X2 interface.
5405、 若用户设备衍生的密钥与辅基站的衍生的密钥不相同, 则使用户设备删除辅基站或使用户设备重新衍生密钥。 示例性的, 假设主基站向辅基站判断的结果为: UE衍生的与辅 基站有关的 KUPint与辅基站自身衍生的 !^^^不相同, 那么, 辅基站 可以通知 UE删除该辅基站或者使 UE重新 †生与该辅基站相关的密 钥。 S405: If the key derived by the user equipment is different from the derived key of the secondary base station, the user equipment is deleted or the user equipment is re-derived. Exemplarily, it is assumed that the result that the primary base station determines to the secondary base station is: the UE-derived K UPint associated with the secondary base station and the secondary base station itself are derived! ^^^ is not the same, then the secondary base station can notify the UE to delete the secondary base station or cause the UE to regenerate the key associated with the secondary base station.
本发明的实施例提供一种校验密钥的方法, 接收用户设备发送 的校验信息, 校验信息为用户设备对预设数据通过用户设备衍生的 密钥、 预设算法进行保护后得到的信息, 预设算法包括加密算法、 完整性保护算法中的至少一种; 根据辅基站衍生的密钥、 预设算法、 预设数据以及校验信息获取目标数据; 根据预设数据、 校验信息以 及目标数据判断用户设备衍生的密钥与辅基站衍生的密钥是否相 同, 得到判断结果; 将判断结果发送给辅基站。 能够校验用户设备 与辅基站之间的密钥是否正确, 可以避免由于密钥以及相应的算法 不正确而导致的用户设备与辅基站之间的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key, which receives verification information sent by a user equipment, and the verification information is obtained by the user equipment protecting the preset data by using a key derived by the user equipment and a preset algorithm. The information, the preset algorithm includes at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived from the secondary base station, a preset algorithm, preset data, and verification information; according to preset data, verification information And determining, by the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and obtaining a determination result; and sending the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
本发明的实施例提供一种校验密钥的方法, 基于 UE , 如图 14 所示, 该方法包括: An embodiment of the present invention provides a method for verifying a key. Based on the UE, as shown in FIG. 14, the method includes:
S50 用户设备根据用户设备衍生的密钥、 预设算法对接收到 的下行数据进行解密。 The S50 user equipment decrypts the received downlink data according to the key derived by the user equipment and a preset algorithm.
S 502、 用户设备根据解密后的数据判断用户设备衍生的密钥与 辅基站衍生的密钥是否相同。 S 502. The user equipment determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
具体的, 用户设备根据解密后的数据判断用户设备衍生的密钥 与辅基站衍生的密钥是否相同包括: Specifically, the user equipment determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
用户设备获取解密后的数据包的互联网协议地址和端口号; 若可以识别互联网协议地址和端口号, 确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, The user equipment obtains the Internet Protocol address and the port number of the decrypted data packet; if the Internet Protocol address and the port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号, 确定用户设备衍生的 密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
S503、 用户设备向辅基站发送判断结果。 S503. The user equipment sends a determination result to the secondary base station.
本发明的实施例提供一种校验密钥的方法, 用户设备根据用户 设备衍生的密钥、 预设算法对接收到的下行数据进行解密; 用户设 备根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的密钥 是否相同; 用户设备向辅基站发送判断结果。 能够校验用户设备与 辅基站之间的密钥是否正确, 可以避免由于密钥以及相应的算法不 正确而导致的用户设备与辅基站之间的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key, where the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm; The device determines whether the key derived by the user equipment is the same as the key derived by the secondary base station according to the decrypted data; the user equipment sends the determination result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
为了使本领域技术人员能够更清楚地理解本发明实施例提供的 技术方案, 下面通过具体的实施例, 对本发明的实施例提供基于 UE 的校验密钥的方法进行详细说明, 如图 15所示, 该方法包括: In order to enable a person skilled in the art to more clearly understand the technical solutions provided by the embodiments of the present invention, a method for providing a UE-based verification key according to an embodiment of the present invention is described in detail below by using a specific embodiment, as shown in FIG. Show that the method includes:
5601、 用户设备根据用户设备衍生的密钥、 预设算法对接收到 的下行数据进行解密。 S601. The user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm.
示例性的, 其中, 预设算法可以是加密算法, UE与辅基站之间 已经建立连接, UE根据自身衍生的密钥、 加密算法对从网络侧接收 到的加密的下行数据进行解密, 然后得到 IP报文。 Exemplarily, the preset algorithm may be an encryption algorithm, and a connection is established between the UE and the secondary base station, and the UE decrypts the encrypted downlink data received from the network side according to the key and encryption algorithm derived by the UE, and then obtains IP packet.
5602、 用户设备获取解密后的数据包的互联网协议地址和端口 号。 S602. The user equipment obtains an internet protocol address and a port number of the decrypted data packet.
示例性的, UE对解密后得的 IP报文进行解析, 得到该报文的 IP地址以及端口号。 Exemplarily, the UE parses the decrypted IP packet to obtain an IP address and a port number of the packet.
5603、 用户设备根据数据包的互联网协议地址和端口号判断用 户设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断结果。 S603. The user equipment determines, according to the Internet Protocol address and the port number of the data packet, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
示例性的, UE 居 IP地址和端口号判断 UE 生的密钥与辅 基站衍生的密钥是否相同,若可以识别该 IP地址与端口号则将该 IP 报文发给对应的应用, 同时也说明 UE 衍生的与辅基站相关的密钥 和辅基站衍生的相关的密钥是相同的;若无法识别该 IP地址和 /或端 口号则 IP报文是错误包, 同时也说明 UE衍生的与辅基站相关的密 钥和辅基站衍生的相关的密钥不相同。 Exemplarily, the UE has an IP address and a port number to determine whether the key generated by the UE is the same as the key generated by the secondary base station. If the IP address and the port number can be identified, the IP packet is sent to the corresponding application, and The UE-derived key associated with the secondary base station and the secondary base-derived key are the same; if the IP address and/or port number cannot be identified, the IP packet is an error packet, and the UE-derived The key associated with the secondary base station is different from the associated key derived by the secondary base station.
5604、 用户设备向辅基站发送判断结果。 S604. The user equipment sends a determination result to the secondary base station.
示例性的, U E将判断的结果通过主基站发送给辅基站。 Exemplarily, U E sends the result of the judgment to the secondary base station through the primary base station.
5605、 若用户设备衍生的密钥与辅基站衍生的密钥不相同, 用 户设备通知主基站删除该辅基站; 或用户设备通知主基站重新添加 该辅基站; 或用户设备通过主基站通知该辅基站重新触发重配置流 程; 或用户设备通过主基站通知该辅基站删除该辅基站。 The user equipment notifies the primary base station to delete the secondary base station, or the user equipment notifies the primary base station to re-add the secondary base station; or the user equipment notifies the secondary base station to notify the secondary base station. Base station re-trigger reconfiguration flow The user equipment notifies the secondary base station to delete the secondary base station through the primary base station.
示例性的, 如果 UE 衍生的与辅基站相关的密钥与辅基站衍生 的相关的密钥不相同, UE可以通知主基站添加的辅基站有问题, 同 时可以指示辅基站的哪个承载出了问题, 即在指示中携带承载标识, 主基站确定该辅基站有问题后删除该辅基站或者使主基站重新添加 该辅基站; 或者 UE 还可以通过主基站通知该辅基站重新触发重新 配置与 UE的连接; 或 UE通过主基站通知该辅基站删除该辅基站。 Exemplarily, if the UE-derived key associated with the secondary base station is different from the secondary base-derived related key, the UE may notify the primary base station that the secondary base station has a problem, and may indicate which of the secondary base station has a problem. The bearer identifier is carried in the indication, the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the UE may notify the secondary base station to re-trigger the reconfiguration with the UE by the primary base station. Connected; or the UE notifies the secondary base station to delete the secondary base station through the primary base station.
本发明的实施例提供一种校验密钥的方法, 用户设备根据用户 设备衍生的密钥、 预设算法对接收到的下行数据进行解密; 用户设 备根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的密钥 是否相同; 向辅基站发送判断结果。 能够校验用户设备与辅基站之 间的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导 致的用户设备与辅基站之间的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key. The user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm. The user equipment determines the density of the user equipment according to the decrypted data. Whether the key is the same as the key derived by the secondary base station; the judgment result is sent to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station caused by the key and the corresponding algorithm being incorrect.
本发明的实施例提供一种校验密钥的方法, 基于核心网网元, 如图 16所示, 该方法包括: An embodiment of the present invention provides a method for verifying a key. Based on a core network element, as shown in FIG. 16, the method includes:
S70 核心网网元接收辅基站根据辅基站衍生的密钥以及预设 算法对用户设备发送的上行数据进行解密后的数据。 The S70 core network element receives the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm.
5702、 核心网网元根据解密后的数据判断用户设备衍生的密钥 与辅基站衍生的密钥是否相同。 5702. The core network element determines, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station.
具体的, 核心网网元根据解密后的数据判断用户设备衍生的密 钥与辅基站衍生的密钥是否相同包括: Specifically, the core network element determines, according to the decrypted data, whether the key derived by the user equipment and the key derived by the secondary base station are the same:
获取解密后的数据包的互联网协议地址和端口号; Obtaining the Internet Protocol address and port number of the decrypted data packet;
若可以识别互联网协议地址和端口号, 确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, If the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号, 确定用户设备衍生的 密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
5703、 核心网网元向辅基站发送判断的结果。 5703. The core network element sends a result of the judgment to the secondary base station.
本发明的实施例提供一种校验密钥的方法, 核心网网元接收辅 基站根据辅基站衍生的密钥以及预设算法对用户设备发送的上行数 据进行解密后的数据; 核心网网元根据解密后的数据判断用户设备 衍生的密钥与辅基站衍生的密钥是否相同; 核心网网元向辅基站发 送判断的结果。 能够校验用户设备与辅基站之间的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致的用户设备与辅基 站之间的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key, where a core network element receives a number of uplinks sent by a secondary base station to a user equipment according to a key derived by the secondary base station and a preset algorithm. According to the decrypted data, the core network element determines whether the key derived by the user equipment is the same as the key derived by the secondary base station according to the decrypted data; the core network element sends the result of the judgment to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
为了使本领域技术人员能够更清楚地理解本发明实施例提供的 技术方案, 下面通过具体的实施例, 对本发明的实施例提供基于核 心网网元的校验密钥的方法进行详细说明, 如图 17所示, 该方法包 括: In order to enable a person skilled in the art to more clearly understand the technical solutions provided by the embodiments of the present invention, a method for providing a verification key based on a core network element of the core network is described in detail by using a specific embodiment. As shown in Figure 17, the method includes:
5801、 核心网网元接收辅基站根据辅基站衍生的密钥以及预设 算法对用户设备发送的上行数据进行解密后的数据。 5801. The core network element receives the data that the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm.
示例性的, 其中, 预设数据可以是加密算法, UE与辅基站之间 已经建立连接, 辅基站根据自身衍生的密钥、 加密算法对从 UE 接 收到的加密的上行数据进行解密得到 IP报文, 将 IP报文发送给核 心网网元则核心网网元接 i\ 到 IP ^艮文。 Exemplarily, the preset data may be an encryption algorithm, and a connection is established between the UE and the secondary base station, and the secondary base station decrypts the encrypted uplink data received from the UE according to the key and encryption algorithm derived by the secondary base station to obtain an IP report. If the IP packet is sent to the core network element, the core network element is connected to the IP address.
5802、 核心网网元获取解密后的数据包的互联网协议地址和端 口号。 5802. The core network element obtains an internet protocol address and a port number of the decrypted data packet.
示例性的, 核心网网元对接收到的 IP报文进行解析, 得到该报 文的 IP地址以及端口号。 For example, the core network element parses the received IP packet to obtain the IP address and port number of the packet.
5803、 核心网网元根据数据包的互联网协议地址和端口号判断 用户设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断结果。 5803. The core network element determines, according to the Internet protocol address and the port number of the data packet, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained.
示例性的, 核心网网元 居 IP地址和端口号判断 UE 4汙生的密 钥与辅基站衍生的密钥是否相同, 若可以识别该 IP地址与端口号则 将该 IP报文发给对应的应用, 同时也说明 UE衍生的与辅基站相关 的密钥和辅基站衍生的相关的密钥是相同的; 若无法识别该 IP地址 和 /或端口号则 IP报文是错误包, 同时也说明 UE衍生的与辅基站相 关的密钥和辅基站衍生的相关的密钥不相同。 Exemplarily, the core network element has an IP address and a port number to determine whether the key of the UE 4 is the same as the key derived by the secondary base station. If the IP address and the port number can be identified, the IP packet is sent to the corresponding one. The application also shows that the UE-derived key associated with the secondary base station and the secondary base-derived related key are the same; if the IP address and/or port number cannot be identified, the IP packet is an error packet, and It is indicated that the UE-derived key associated with the secondary base station and the secondary base-derived related key are different.
5804、 核心网网元向辅基站发送判断结果。 5804. The core network element sends a determination result to the secondary base station.
示例性的, 核心网网元将判断的结果发送给辅基站。 S 805、 若用户设备衍生的密钥与辅基站衍生的密钥不相同, 核 心网网元通知主基站删除该辅基站; 或核心网网元通知主基站重新 添加该辅基站; 或核心网网元通过主基站通知该辅基站重新触发重 配置流程; 或核心网网元通过主基站通知该辅基站删除该辅基站。 Exemplarily, the core network element sends the result of the judgment to the secondary base station. S 805. If the key derived by the user equipment is different from the key generated by the secondary base station, the core network element notifies the primary base station to delete the secondary base station; or the core network element notifies the primary base station to re-add the secondary base station; or the core network The element notifies the secondary base station to re-trigger the reconfiguration process by the primary base station; or the core network element notifies the secondary base station to delete the secondary base station by the primary base station.
示例性的, 如果 UE 衍生的与辅基站相关的密钥与辅基站衍生 的相关的密钥不相同, 核心网网元可以通过 MME 通知主基站或直 接通知主基站添加的辅基站有问题, 同时可以指示辅基站的哪个承 载出了问题, 即在指示中携带承载标识, 主基站确定该辅基站有问 题后删除该辅基站或者使主基站重新添加该辅基站; 或核心网网元 通过主基站通知该辅基站删除该辅基站。 Exemplarily, if the UE-derived key associated with the secondary base station is different from the secondary base-derived related key, the core network element may notify the primary base station through the MME or directly notify the primary base station that the secondary base station has a problem, and The bearer may be instructed to carry the problem, that is, the bearer identifier is carried in the indication, and the primary base station determines that the secondary base station has a problem, deletes the secondary base station, or causes the primary base station to re-add the secondary base station; or the core network element passes the primary base station. The secondary base station is notified to delete the secondary base station.
本发明的实施例提供一种校验密钥的方法, 核心网网元接收辅 基站根据辅基站衍生的密钥以及预设算法对用户设备发送的上行数 据进行解密后的数据; 核心网网元根据解密后的数据判断用户设备 衍生的密钥与辅基站衍生的密钥是否相同; 核心网网元向辅基站发 送判断的结果。 能够校验用户设备与辅基站之间的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致的用户设备与辅基 站之间的数据错误甚至业务中断。 An embodiment of the present invention provides a method for verifying a key, where a core network element receives data decrypted by a secondary base station according to a key derived by a secondary base station and a preset algorithm for decrypting uplink data sent by the user equipment; Determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station; the core network element sends the result of the judgment to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
本发明的实施例提供一种基站 60 , 如图 18 所示, 该用户设备 60 包括: 总线 64 ; 以及连接到总线 64 的处理器 61、 存储器 62和 接口 63 , 其中该接口 63用于通信; 该存储器 62用于存储计算机代 码, 处理器 61用于执行该计算机代码用于: An embodiment of the present invention provides a base station 60. As shown in FIG. 18, the user equipment 60 includes: a bus 64; and a processor 61, a memory 62, and an interface 63 connected to the bus 64, wherein the interface 63 is used for communication; The memory 62 is for storing computer code, and the processor 61 is configured to execute the computer code for:
接收用户设备发送的校验信息, 校验信息为用户设备对预设数 据通过用户设备衍生的密钥、 预设算法进行保护后得到的信息, 预 设算法包括加密算法、 完整性保护算法中的至少一种; Receiving the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm and an integrity protection algorithm. At least one
根据基站衍生的密钥、 预设算法、 预设数据以及校验信息获取 目标数据; Obtaining target data according to a key derived by the base station, a preset algorithm, preset data, and verification information;
根据预设数据、 校验信息以及目标数据判断用户设备衍生的密 钥与基站衍生的密钥是否相同。 The user equipment-derived key is determined to be the same as the base station-derived key according to the preset data, the verification information, and the target data.
可选的, 处理器 61执行该计算机代码还用于: 若用户设备衍生的密钥与基站衍生的密钥不相同, 则使用户设 备重新衍生密钥或使用户设备删除基站。 Optionally, the processor 61 executes the computer code and is further configured to: If the key derived by the user equipment is different from the key derived by the base station, the user equipment is re-derived or the user equipment is deleted.
可选的,处理器 61执行该计算机代码用于接收用户设备发送的 校验信息, 具体用于: Optionally, the processor 61 executes the computer code for receiving the verification information sent by the user equipment, specifically for:
通过 X2 接口从主基站接收基站添加完成消息, 基站添加完成 消息携带校验信息; 或 Receiving, by the X2 interface, a base station addition completion message from the primary base station, and the base station addition completion message carries the verification information; or
接收用户设备发送的媒体接入控制消息, 媒体接入控制消息携 带校验信息; 或 Receiving a media access control message sent by the user equipment, where the media access control message carries the verification information; or
接收用户设备发送的分组包汇聚协议数据, 分组包汇聚协议数 据携带校验信息。 Receiving packet packet convergence protocol data sent by the user equipment, and the packet packet convergence protocol data carries verification information.
可选的, 预设数据包括以下中的至少一种: Optionally, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
可选的, 该基站为辅基站。 Optionally, the base station is a secondary base station.
本发明的实施例提供一种基站,接收用户设备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 预设算法包括加密算法、 完整性保护算 法中的至少一种; 根据基站衍生的密钥、 预设算法、 预设数据以及 校验信息获取目标数据; 根据预设数据、 校验信息以及目标数据判 断用户设备衍生的密钥与基站衍生的密钥是否相同。 能够校验用户 设备与基站之间的密钥是否正确, 可以避免由于密钥以及相应的算 法不正确而导致的用户设备与辅基站之间的业务中断。 The embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used. The method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the base station, a preset algorithm, preset data, and verification information; determining the user equipment according to the preset data, the verification information, and the target data; Whether the derived key is the same as the key derived by the base station. It is possible to check whether the key between the user equipment and the base station is correct, and the service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm can be avoided.
本发明的实施例提供一种基站 70 , 如图 19所示, 该基站 70 包 括: 总线 74 ; 以及连接到总线 74 的处理器 71、 存储器 72 和接口 73 , 其中该接口 73 用于通信; 该存储器 72用于存储计算机代码, 处理器 71用于执行该计算机代码用于: 接收用户设备发送的校验信息, 校验信息为用户设备对预设数 据通过用户设备衍生的密钥、 预设算法进行保护后得到的信息, 预 设算法包括加密算法、 完整性保护算法中的至少一种; An embodiment of the present invention provides a base station 70. As shown in FIG. 19, the base station 70 includes: a bus 74; and a processor 71, a memory 72, and an interface 73 connected to the bus 74, wherein the interface 73 is used for communication; The memory 72 is for storing computer code, and the processor 71 is configured to execute the computer code for: Receiving the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment-derived key and the preset algorithm, and the preset algorithm includes an encryption algorithm and an integrity protection algorithm. At least one
根据辅基站衍生的密钥、 预设算法、 预设数据以及校验信息获 取目标数据; Obtaining target data according to a key derived from the secondary base station, a preset algorithm, preset data, and verification information;
根据预设数据、 校验信息以及目标数据判断用户设备衍生的密 钥与辅基站衍生的密钥是否相同, 得到判断结果; Determining, according to the preset data, the verification information, and the target data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, and the judgment result is obtained;
用于将判断结果发送给辅基站。 It is used to send the judgment result to the secondary base station.
可选的, 处理器 71执行该计算机代码还用于: Optionally, the processor 71 executes the computer code and is further configured to:
若用户设备衍生的密钥与辅基站的衍生的密钥不相同, 则使用 户设备删除辅基站或使用户设备重新衍生密钥。 If the key derived by the user equipment is different from the derived key of the secondary base station, the user equipment deletes the secondary base station or causes the user equipment to re-derived the key.
可选的,处理器 71执行该计算机代码用于接收用户设备发送的 校验信息, 具体用于: Optionally, the processor 71 executes the computer code for receiving the verification information sent by the user equipment, specifically for:
接收用户设备发送的无线资源控制消息, 无线资源控制消息携 带校验信息。 Receiving a radio resource control message sent by the user equipment, and the radio resource control message carries the verification information.
可选的, 预设数据包括以下中的至少一种: Optionally, the preset data includes at least one of the following:
辅基站下的小区标识, 辅基站下的物理小区标识, 辅基站下的 小区无线网络临时标识、 主基站下的小区标识, 主基站下的物理小 区标识, 主基站下的小区无线网络临时标识、 辅基站与用户设备均 存储的标识数据、 主基站或者辅基站传给用户设备的数据、 特定数 字。 a cell identifier under the secondary base station, a physical cell identifier under the secondary base station, a temporary wireless network temporary identifier under the secondary base station, a cell identifier under the primary base station, a physical cell identifier under the primary base station, a temporary wireless network temporary identifier under the primary base station, The identification data stored by the secondary base station and the user equipment, the data transmitted by the primary base station or the secondary base station to the user equipment, and specific numbers.
本发明的实施例提供一种基站,接收用户设备发送的校验信息, 校验信息为用户设备对预设数据通过用户设备衍生的密钥、 预设算 法进行保护后得到的信息, 预设算法包括加密算法、 完整性保护算 法中的至少一种; 根据辅基站衍生的密钥、 预设算法、 预设数据以 及校验信息获取目标数据; 根据预设数据、 校验信息以及目标数据 判断用户设备衍生的密钥与辅基站衍生的密钥是否相同, 得到判断 结果; 将判断结果发送给辅基站。 能够校验用户设备与辅基站之间 的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而导致 的用户设备与辅基站之间的数据错误甚至业务中断。 The embodiment of the present invention provides a base station, which receives the verification information sent by the user equipment, and the verification information is information obtained by the user equipment after the preset data is protected by the user equipment, and the preset algorithm is used. The method includes: at least one of an encryption algorithm and an integrity protection algorithm; acquiring target data according to a key derived by the secondary base station, a preset algorithm, preset data, and verification information; determining the user according to the preset data, the verification information, and the target data Whether the key derived by the device is the same as the key derived by the secondary base station, and the judgment result is obtained; the judgment result is sent to the secondary base station. It can check whether the key between the user equipment and the secondary base station is correct, and can avoid the key and the corresponding algorithm being incorrect. Data errors and even business interruptions between the user equipment and the secondary base station.
本发明的实施例提供一种用户设备 80 , 如图 20 所示, 该用户 设备 80 包括: 总线 84 ; 以及连接到总线 84 的处理器 81、 存储器 82和接口 83 , 其中该接口 83用于通信; 该存储器 82用于存储计算 机代码, 处理器 81用于执行该计算机代码用于: An embodiment of the present invention provides a user equipment 80. As shown in FIG. 20, the user equipment 80 includes: a bus 84; and a processor 81, a memory 82, and an interface 83 connected to the bus 84, wherein the interface 83 is used for communication. The memory 82 is for storing computer code, and the processor 81 is configured to execute the computer code for:
根据用户设备衍生的密钥、 预设算法对接收到的下行数据进行 解密; Decrypting the received downlink data according to a key derived by the user equipment and a preset algorithm;
根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的密 钥是否相同; Determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station;
向辅基站发送判断结果; Sending a judgment result to the secondary base station;
其中, 根据解密后的数据判断用户设备衍生的密钥与辅基站衍 生的密钥是否相同包括: The determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station includes:
获取解密后的数据包的互联网协议地址和端口号; Obtaining the Internet Protocol address and port number of the decrypted data packet;
若可以识别互联网协议地址和端口号, 确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, If the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号, 确定用户设备衍生的 密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
可选的, 处理器 81执行该计算机代码还用于: Optionally, the processor 81 executes the computer code and is further configured to:
若用户设备衍生的密钥与辅基站衍生的密钥不相同, 通知主基 站删除辅基站; 或通知主基站重新添加辅基站; 或通过主基站通知 辅基站重新触发重配置流程; 或通过主基站通知辅基站删除辅基站。 If the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify the secondary base station to re-trigger the reconfiguration process by the primary base station; or pass the primary base station. The secondary base station is notified to delete the secondary base station.
本发明的实施例提供一种用户设备, 用户设备根据用户设备衍 生的密钥、 预设算法对接收到的下行数据进行解密; 用户设备根据 解密后的数据判断用户设备衍生的密钥与辅基站衍生的密钥是否相 同; 用户设备向辅基站发送判断结果。 能够校验用户设备与辅基站 之间的密钥是否正确, 可以避免由于密钥以及相应的算法不正确而 导致的用户设备与辅基站之间的数据错误甚至业务中断。 The embodiment of the present invention provides a user equipment, where the user equipment decrypts the received downlink data according to a key derived by the user equipment and a preset algorithm; the user equipment determines, according to the decrypted data, the key derived by the user equipment and the secondary base station. Whether the derived keys are the same; the user equipment sends the judgment result to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm.
本发明的实施例提供一种核心网网元 90 , 如图 21 所示, 该核 心网网元 90包括: 总线 94 ; 以及连接到总线 94的处理器 91、 存储 器 92和接口 93 , 其中该接口 93 用于通信; 该存储器 92用于存储 计算机代码, 处理器 91用于执行该计算机代码用于: The embodiment of the present invention provides a core network element 90. As shown in FIG. 21, the core network element 90 includes: a bus 94; and a processor 91 connected to the bus 94, and stores And an interface 93, wherein the interface 93 is for communication; the memory 92 is for storing computer code, and the processor 91 is configured to execute the computer code for:
接收辅基站根据辅基站衍生的密钥以及预设算法对用户设备发 送的上行数据进行解密后的数据; Receiving, after the secondary base station decrypts the uplink data sent by the user equipment according to the key derived by the secondary base station and the preset algorithm;
根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的密 钥是否相同; Determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station;
向辅基站发送判断的结果; Sending the result of the judgment to the secondary base station;
其中, 根据解密后的数据判断用户设备衍生的密钥与辅基站衍 生的密钥是否相同, 包括: And determining, according to the decrypted data, whether the key derived by the user equipment is the same as the key derived by the secondary base station, including:
获取解密后的数据包的互联网协议地址和端口号; Obtaining the Internet Protocol address and port number of the decrypted data packet;
若可以识别互联网协议地址和端口号, 确定用户设备衍生的密 钥与辅基站衍生的密钥相同; 或, If the Internet Protocol address and port number can be identified, it is determined that the key derived by the user equipment is the same as the key derived by the secondary base station; or
若无法识别互联网协议地址和 /或端口号, 确定用户设备衍生的 密钥与辅基站衍生的密钥不相同。 If the Internet Protocol address and/or port number cannot be identified, it is determined that the user equipment derived key is not the same as the secondary base station derived key.
可选的, 处理器 91执行该计算机代码还用于: Optionally, the processor 91 executes the computer code and is further configured to:
若用户设备衍生的密钥与辅基站衍生的密钥不相同, 通知主基 站删除辅基站; 或通知主基站重新添加辅基站; 或通过主基站通知 辅基站重新触发重配置流程; 或通过主基站通知辅基站删除辅基站。 If the key derived by the user equipment is different from the key derived by the secondary base station, notify the primary base station to delete the secondary base station; or notify the primary base station to re-add the secondary base station; or notify the secondary base station to re-trigger the reconfiguration process by the primary base station; or pass the primary base station. The secondary base station is notified to delete the secondary base station.
可选的,处理器 91执行该计算机代码用于通知主基站删除辅基 站或通知主基站重新添加辅基站, 具体用于: Optionally, the processor 91 executes the computer code to notify the primary base station to delete the secondary base station or notify the primary base station to re-add the secondary base station, specifically for:
向移动性管理实体发送密钥不相同的消息, 并由移动性管理实 体向主基站转发密钥不相同的消息, 以使主基站收到密钥不相同的 消息后删除辅基站或重新添加辅基站。 Sending a message with a different key to the mobility management entity, and forwarding, by the mobility management entity, a message with a different key to the primary base station, so that the primary base station receives the message with the same key, deletes the secondary base station, or re-adds the auxiliary Base station.
本发明的实施例提供一种核心网网元, 接收辅基站根据辅基站 衍生的密钥以及预设算法对用户设备发送的上行数据进行解密后的 数据; 根据解密后的数据判断用户设备衍生的密钥与辅基站衍生的 密钥是否相同; 向辅基站发送判断的结果。 能够校验用户设备与辅 基站之间的密钥是否正确, 可以避免由于密钥以及相应的算法不正 确而导致的用户设备与辅基站之间的数据错误甚至业务中断。 本发明中术语 "和 /或", 仅仅是一种描述关联对象的关联关系, 表示可以存在三种关系, 例如, A和 /或 B , 可以表示: 单独存在 A , 同时存在 A和 B , 单独存在 B这三种情况。 另外, 本文中字符 " /" , 一般表示前后关联对象是一种 "或" 的关系。 An embodiment of the present invention provides a network element of a core network, which receives data obtained by decrypting uplink data sent by a user equipment according to a key derived by a secondary base station and a preset algorithm, and determining, according to the decrypted data, a user equipment derivative. Whether the key is the same as the key derived by the secondary base station; the result of the judgment is sent to the secondary base station. It can verify whether the key between the user equipment and the secondary base station is correct, and can avoid data errors or even service interruption between the user equipment and the secondary base station due to the incorrect key and the corresponding algorithm. The term "and/or" in the present invention is merely an association relationship describing an associated object, indicating that there may be three relationships, for example, A and/or B, which may indicate that: A exists alone, and both A and B exist, alone There are three cases of B. In addition, the character "/" in this article generally means that the contextual object is an "or" relationship.
通过以上的实施方式的描述, 所属领域的技术人员可以清楚地 了解到, 为描述的方便和简洁, 仅以上述各功能模块的划分进行举 例说明, 实际应用中, 可以根据需要而将上述功能分配由不同的功 能模块完成, 即将装置的内部结构划分成不同的功能模块, 以完成 以上描述的全部或者部分功能。 上述描述的系统, 装置和单元的具 体工作过程, 可以参考前述方法实施例中的对应过程, 在此不再赘 述。 Through the description of the above embodiments, those skilled in the art can clearly understand that for the convenience and brevity of the description, only the division of the above functional modules is illustrated. In practical applications, the above functions can be allocated according to needs. It is completed by different functional modules, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. For the specific operation of the system, the device, and the unit, the corresponding processes in the foregoing method embodiments may be referred to, and details are not described herein.
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统, 装置和方法, 可以通过其它的方式实现。 例如, 以上所描述的装置 实施例仅仅是示意性的, 例如, 所述单元的划分, 仅仅为一种逻辑 功能划分, 实际实现时可以有另外的划分方式, 例如多个单元或组 件可以结合或者可以集成到另一个系统, 或一些特征可以忽略, 或 不执行。 另一点, 所显示或讨论的相互之间的耦合或直接耦合或通 信连接可以是通过一些接口, 装置或单元的间接耦合或通信连接, 可以是电性, 机械或其它的形式。 In the several embodiments provided by the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed. In addition, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
所述作为分离部件说明的单元可以是或者也可以不是物理上分 开的, 作为单元显示的部件可以是或者也可以不是物理单元, 即可 以位于一个地方, 或者也可以分布到多个网络单元上。 可以根据实 际的需要选择其中的部分或者全部单元来实现本实施例方案的 目 的。 The units described as separate components may or may not be physically separated, and the components displayed as the units may or may not be physical units, and may be located in one place or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiment of the present embodiment.
另外, 在本发明各个实施例中的各功能单元可以集成在一个处 理单元中, 也可以是各个单元单独物理包括, 也可以两个或两个以 上单元集成在一个单元中。 上述集成的单元既可以釆用硬件的形式 实现, 也可以釆用硬件加软件功能单元的形式实现。 In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的 产品销售或使用时, 可以存储在一个计算机可读取存储介质中。 基 于这样的理解, 本发明的技术方案本质上或者说对现有技术做出贡 献的部分或者该技术方案的全部或部分可以以软件产品的形式体现 出来, 该计算机软件产品存储在一个存储介质中, 包括若干指令用 以使得一台计算机设备 (可以是个人计算机, 服务器, 或者网络设 备等) 或处理器 ( processor ) 执行本发明各个实施例所述方法的全 部或部分步骤。 而前述的存储介质包括: U 盘、 移动硬盘、 只读存 储器( ROM , Read-Only Memory )、 随机存取存储器( RAM , Random Access Memory ) , 磁碟或者光盘等各种可以存储程序代码的介质。 The integrated unit is implemented in the form of a software functional unit and is independent When the product is sold or used, it can be stored on a computer readable storage medium. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. The instructions include a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods of the various embodiments of the present invention. The foregoing storage medium includes: a U disk, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. .
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围 并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技 术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围 之内。 因此, 本发明的保护范围应以所述权利要求的保护范围为准。 The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the appended claims.
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201480000891.9A CN105027495B (en) | 2014-01-14 | 2014-01-14 | A kind of method of check key, base station, user equipment and core network element |
| PCT/CN2014/070607 WO2015106387A1 (en) | 2014-01-14 | 2014-01-14 | Key verification method, base station, user device and core network element |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2014/070607 WO2015106387A1 (en) | 2014-01-14 | 2014-01-14 | Key verification method, base station, user device and core network element |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2015106387A1 true WO2015106387A1 (en) | 2015-07-23 |
Family
ID=53542265
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2014/070607 Ceased WO2015106387A1 (en) | 2014-01-14 | 2014-01-14 | Key verification method, base station, user device and core network element |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105027495B (en) |
| WO (1) | WO2015106387A1 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113573423B (en) * | 2018-05-30 | 2024-01-16 | 华为技术有限公司 | A communication method and device |
| CN113132924B (en) * | 2021-04-19 | 2022-01-21 | 北京达源环保科技有限公司 | Information transmission method and system for high-deployment-density sludge anaerobic digestion monitoring terminal |
| CN114069826A (en) * | 2021-10-30 | 2022-02-18 | 国网湖南省电力有限公司 | Method, system and medium for checking 5G communication security of spare power automatic switching device |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859772A (en) * | 2006-01-07 | 2006-11-08 | 华为技术有限公司 | Safety service communication method based on general authentification frame |
| CN101102186A (en) * | 2006-07-04 | 2008-01-09 | 华为技术有限公司 | Implementation method of general authentication framework push service |
| US20120155647A1 (en) * | 2010-12-21 | 2012-06-21 | General Instrument Corporation | Cryptographic devices & methods |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101309503A (en) * | 2007-05-17 | 2008-11-19 | 华为技术有限公司 | Wireless handover method, base station and terminal |
| EP2028890B1 (en) * | 2007-08-12 | 2019-01-02 | LG Electronics Inc. | Handover method with link failure recovery, wireless device and base station for implementing such method |
| CN101400059B (en) * | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | A key update method and device in an active state |
| CN102595399B (en) * | 2008-06-23 | 2017-02-01 | 华为技术有限公司 | Key derivation method, device and system |
| US9002357B2 (en) * | 2009-06-26 | 2015-04-07 | Qualcomm Incorporated | Systems, apparatus and methods to facilitate handover security |
| CN101715188B (en) * | 2010-01-14 | 2015-11-25 | 中兴通讯股份有限公司 | A kind of update method of air interface key and system |
| CN102215485B (en) * | 2010-04-04 | 2015-07-22 | 中兴通讯股份有限公司 | Method for guaranteeing safety of multi-carrier switching or reconstructing in multi-carrier communication system |
-
2014
- 2014-01-14 WO PCT/CN2014/070607 patent/WO2015106387A1/en not_active Ceased
- 2014-01-14 CN CN201480000891.9A patent/CN105027495B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859772A (en) * | 2006-01-07 | 2006-11-08 | 华为技术有限公司 | Safety service communication method based on general authentification frame |
| CN101102186A (en) * | 2006-07-04 | 2008-01-09 | 华为技术有限公司 | Implementation method of general authentication framework push service |
| US20120155647A1 (en) * | 2010-12-21 | 2012-06-21 | General Instrument Corporation | Cryptographic devices & methods |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105027495B (en) | 2018-12-14 |
| CN105027495A (en) | 2015-11-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108966220B (en) | A kind of key deduction method and network device | |
| JP7074847B2 (en) | Security protection methods, devices and systems | |
| CN110035054B (en) | Method and system for enabling secure communication for transport between ENBs | |
| US10299119B2 (en) | Method and system for providing security from a radio access network | |
| CN107113895B (en) | Communication method, network side equipment and user equipment | |
| CN112105015B (en) | Secondary authentication method and device | |
| US20170359719A1 (en) | Key generation method, device, and system | |
| US10320754B2 (en) | Data transmission method and apparatus | |
| WO2011032497A1 (en) | Method, device and system for reconfiguring aggregation cell | |
| CN113225784B (en) | Message identification method and device | |
| CN109246696B (en) | Key processing method and related device | |
| CN103167492B (en) | Generate method and the equipment thereof of access layer secret key in a communications system | |
| WO2012031510A1 (en) | Method and system for implementing synchronous binding of security key | |
| CN103888936B (en) | Community optimization method and device | |
| US20220345883A1 (en) | Security key updates in dual connectivity | |
| WO2020056433A2 (en) | SECURE COMMUNICATION OF RADIO RESOURCE CONTROL (RRC) REQUEST OVER SIGNAL RADIO BEARER ZERO (SRBo) | |
| KR20150103063A (en) | Method for synchronizing encryption information between scell and ue | |
| CN105191479A (en) | An information protection method, base station, user equipment and mobility management entity | |
| WO2015106387A1 (en) | Key verification method, base station, user device and core network element | |
| CN104812010A (en) | Method for supporting UE recovery under small community reinforced scene | |
| WO2018049689A1 (en) | Key negotiation method and apparatus | |
| JP7652263B2 (en) | IAB communication method and device | |
| CN107925874B (en) | Ultra-Dense Network Security Architecture and Methodology | |
| WO2023213191A1 (en) | Security protection method and communication apparatus | |
| WO2015064475A1 (en) | Communication control method, authentication server, and user equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201480000891.9 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14879084 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 14879084 Country of ref document: EP Kind code of ref document: A1 |