[go: up one dir, main page]

WO2019144350A1 - Communication method and communication apparatus - Google Patents

Communication method and communication apparatus Download PDF

Info

Publication number
WO2019144350A1
WO2019144350A1 PCT/CN2018/074163 CN2018074163W WO2019144350A1 WO 2019144350 A1 WO2019144350 A1 WO 2019144350A1 CN 2018074163 W CN2018074163 W CN 2018074163W WO 2019144350 A1 WO2019144350 A1 WO 2019144350A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
random number
verification value
authentication server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/074163
Other languages
French (fr)
Chinese (zh)
Inventor
李华
于游洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201880056744.1A priority Critical patent/CN111052779A/en
Priority to PCT/CN2018/074163 priority patent/WO2019144350A1/en
Publication of WO2019144350A1 publication Critical patent/WO2019144350A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to the field of communications and, more particularly, to communication methods and communication devices in the field of communications.
  • an extensible authentication protocol (EAP) is used for authentication.
  • the authentication server generates a hash value according to the stored password of the saved terminal, and the terminal generates a hash according to the saved password stored by the terminal. If the hash value generated by the authentication server is consistent with the hash value generated by the terminal, the authentication is considered to be passed.
  • the anchor key of the terminal used in the authentication may be used to determine the anchor key, and then the anchor is used. The key is used for communication. However, if the registration password of the terminal is cracked, the attacker can easily obtain the anchor key, so that the communication content of the terminal is easily leaked, and the security of the transmission cannot be guaranteed.
  • the present application provides a communication method and apparatus to help improve the security of transmission.
  • a communication method comprising: an authentication server receiving an encrypted first random number from a terminal; the authentication server according to the encrypted first random number, second random number, and third random number And determining an anchor key; the authentication server transmitting the anchor key to the mobility management device.
  • the first random number is used to replace the registration password of the terminal to determine the anchor key. Since the random number has randomness and can be changed frequently, for example, it can be generated by the terminal every time the session is established. The security problem caused by the long-term use of the registered password of the fixed terminal is avoided.
  • the anchor key is used by the mobility management device to communicate.
  • the mobility management device may communicate with the terminal according to the anchor key, or the mobility management device sends the anchor key to the access network device, and the access network device according to the anchor key The terminal communicates. Further, for example, the mobility management device may generate a lower layer key by using the anchor key, for example, the mobility management device communicates with the terminal using the lower layer key, or the mobility management device And transmitting the lower layer key to the access network device, where the access network device communicates with the terminal by using the lower layer key. For another example, the mobility management device sends the anchor key to an access network device, and the access network device generates a lower layer key according to the anchor key, where the access network device uses the terminal and the terminal The lower layer key communicates.
  • the authentication server may generate one or more lower layer keys according to the anchor key, and the lower layer key may be used for communication of control plane data or for communication of user plane data, for example, a lower layer key. It can be used for communication between control data communication and/or user plane data between the terminal and the mobility management device.
  • the lower layer key can be used for control plane data communication between the terminal and the access network device and/or for surface communication. data communication.
  • the lower layer key between the terminal and the mobility management device may be different from the lower layer key between the terminal and the access network device.
  • the lower layer key used by the control plane data communication between the terminal and the mobility management device may be the same as or different from the lower layer key used by the user plane data.
  • the lower layer key used by the control plane data between the terminal and the access network device may be the same as or different from the lower layer key used by the user plane data, which is not limited in this embodiment.
  • the second random number is generated by a terminal generated by the authentication server or generated by the mobility management device or by a data management device.
  • the method further includes: the authentication server receives the second random number sent by the terminal, and if the third random number is generated by the mobility management device, the authentication server receives the third random number sent by the mobility management device; The three random numbers are generated by the data management device, and the authentication server receives the third random number sent by the data management device.
  • the authentication server can determine the anchor key according to the second random number generated by the terminal, the third random number generated by the network side device, and the encrypted first random number sent by the terminal, and can improve the randomness of the random number. Determine the security of the anchor key.
  • the authentication server acquires a first verification value and a second verification value from a data management device; the authentication server authenticates the terminal according to the first verification value; If the result of the terminal authentication is legal, the second verification value is sent to the terminal, so that the terminal can authenticate the authentication server according to the second verification value.
  • the authentication server acquires a first verification value and a second verification value from the data management device; the authentication server is configured according to the The first verification value authenticates the terminal.
  • the obtaining, by the authentication server, the first verification value and the second verification value from the data management device specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number;
  • the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number;
  • the authentication server receives the first verification value from the data management device and The second verification value.
  • the verification value is generated by the data management device and is transmitted to the authentication server.
  • the method further includes: the authentication server receiving a third verification value sent by the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and Determining, by the authentication server, the authentication password of the terminal, wherein the authentication server authenticates the terminal according to the first verification value, if the first verification value is equal to the third verification value, The authentication server determines that the terminal is legitimate. Optionally, if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid.
  • the first verification value and the third verification value are calculated by using the same authentication method, for example, by using a preset authentication method, or by using an authentication method determined by the terminal and the authentication server.
  • the first verification and the third verification value may be obtained by using a hash algorithm.
  • the method before the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, the method further includes: the authentication server receiving one of the terminal support from the terminal Or two or more authentication methods; the authentication server determines, according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, The first method of authentication.
  • the obtaining, by the authentication server, the first verification value and the second verification value from the data management device including: the authentication server acquiring, by the data management device, the first verification determined according to the first authentication method a value and the second verification value.
  • the authentication method supported by the terminal can be added, so that the authentication server can select the authentication method to be used at one time, and avoid the problem of large authentication delay caused by multiple negotiation.
  • the authentication server receives one or two or more authentication methods supported by the terminal by the terminal, including: the authentication server receives the terminal support from the terminal. One or two or more authentication methods and a priority of each of the one or two or more authentication methods; wherein the authentication server is based on one or both of the terminal support.
  • the above authentication method and the authentication method supported by the authentication server determine a first authentication method used for performing authentication on the terminal, including: the authentication server is based on one or two or more types of authentication supported by the terminal
  • the first authentication method is determined by a priority of each authentication method in the method and an authentication method supported by the authentication server.
  • the authentication method supported by the terminal and the corresponding priority information may be added, wherein the priority information may be used to indicate an authentication method that the terminal desires to use, so that the authentication server can select the need at a time.
  • the authentication method used avoids the problem of large authentication delay caused by multiple negotiation.
  • the terminal carries one or two or more authentication methods supported by the terminal in the registration message sent by the terminal, where the authentication server receives the registration message sent by the terminal, and obtains the registration message in the registration message.
  • One or more authentication methods supported by the terminal may take an intersection in one or more authentication methods supported by the terminal and an authentication method supported by the authentication server itself. If the intersection includes only one element, that is, an authentication method, the authentication method is In an authentication method, if the intersection includes more than two elements, that is, two or more authentication methods, the authentication method may be any one of the two or more authentication methods.
  • the authentication server determines the first authentication method used for authenticating the terminal among the two or more authentication methods according to the priority of each of the one or more authentication methods supported by the terminal.
  • the encrypted first random number is obtained by encrypting the first random number with the first key; the authentication server is configured according to the encrypted first random number, the second random number, and And determining, by the third random number, the anchor key, comprising: the authentication server decrypting the encrypted first random number by using the second key, to obtain the first random number, wherein the second secret
  • the key is a key corresponding to the first key; the authentication server determines the anchor key by using the first random number, the second random number, and the third random number.
  • the authentication server may save the decrypted keys of the multiple terminals. After the authentication server receives the encrypted first random number sent by the terminal, the authentication server may be in the multiple keys saved by the terminal according to the identifier of the terminal. Determining a second key for decrypting the encrypted first random number, that is, the second key is a key corresponding to the first key.
  • the first key and the second key may be a pair of asymmetric keys, the first key is a public key, and the second key is a private key.
  • the first key and the second key are a pair of symmetric keys, that is, the first key and the second key are the same.
  • the first key and the second key are a pair of keys generated according to a Diffie-Hellman DH algorithm.
  • a second aspect provides a communication method, including: a terminal generating a first random number; and determining, by the terminal, an anchor key according to the first random number, the second random number, and a third random number, the anchor A point key is used for the terminal communication.
  • the terminal uses a random number instead of the registration password in the prior art to generate an anchor key, which effectively improves the security of determining the anchor key.
  • the anchor key is used for communication by the terminal, and the terminal may communicate with the mobility management device according to the anchor key, or the terminal may be dense according to the anchor point.
  • the key communicates with the access network device.
  • the anchor key may be a key used to transmit control plane data, or may be a key used to transmit user plane data; optionally, a lower layer key may be generated according to the anchor key, and the lower layer is dense.
  • the key can be used to transfer control plane data or user plane data.
  • the method further includes: the terminal encrypting the first random number to obtain an encrypted first random number; and the terminal sending the encrypted first random to an authentication server number.
  • the second random number is generated by a terminal
  • the third random number is generated by the authentication server or a mobility management device or a data management device.
  • the method further includes: receiving, by the terminal, a third random number sent by the authentication server.
  • the terminal receives a second verification value sent by the data management device by using the authentication server, where the second verification value is determined by a terminal identifier of the terminal and saved by the data management device. Determining, by the terminal, the registration password of the terminal and the second random number; the terminal determining a fourth verification value according to the terminal identifier, the registration password saved by the terminal, and the second random number; The second verification value and the fourth verification value authenticate the authentication server. Specifically, if the second verification value is the same as the fourth verification value, the terminal determines that the authentication server is legal. If the second verification value is different from the fourth verification value, the terminal determines the authentication. The server is not legal.
  • the second verification value and the fourth verification value are calculated by using the same authentication method, for example, by using a preset authentication method, or by using an authentication method determined by the terminal and the authentication server.
  • the second verification and the fourth verification value may be generated by using a hash algorithm.
  • the method further includes: the terminal sending the authentication method supported by the terminal to the authentication server, where the authentication method supported by the terminal may include one, two, or two.
  • the terminal sends one or two or more authentication methods supported by the terminal to the authentication server, where the terminal sends the terminal to the authentication server to send the terminal supported by the terminal. Or two or more authentication methods and the priority of each of the one or two or more authentication methods. By setting different priorities for different authentication methods, the authentication server may be instructed to select the authentication method desired by the terminal at one time according to the instruction of the terminal.
  • a third aspect provides a communication method, including: receiving, by a data management device, a terminal identifier, a second random number, and a third random number of a terminal sent by an authentication server; and the data management device according to the terminal identifier, the Determining, by the second random number and the third random number, a first verification value and a second verification value; the data management device transmitting the first verification value and the second verification value to the authentication server, to facilitate the The authentication server and the terminal perform mutual authentication using the first verification value and the second verification value.
  • the data management device determines the first verification value and the second verification value according to the terminal identifier, the second random number, and the third random number, including: the data management device is configured according to The terminal identifier, the registration password of the terminal saved by the data management device, and the second random number determine the second verification value; the data management device saves according to the terminal identifier and the data management device The registration password of the terminal and the third random number determine the first verification value.
  • the method further includes: the data management device receives an identifier of the first authentication method sent by the authentication server, and the data management device determines, according to the identifier of the first authentication method, a first verification value and The first authentication method adopted by the second verification value, the data management device calculates the first verification value and the second verification value by using the first authentication method.
  • a fourth aspect provides a communication method, including: an authentication server acquiring a first verification value and a second verification value from a data management device; the authentication server authenticating the terminal according to the first verification value; The authentication server sends the second verification value to the terminal if the result of authenticating the terminal is legal.
  • the obtaining, by the authentication server, the first verification value and the second verification value from the data management device specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number;
  • the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number;
  • the authentication server receives the first verification value from the data management device and The second verification value.
  • the method further includes: the authentication server receiving a third verification value from the terminal, the third verification value by the third random number, a terminal identifier of the terminal, and Determining, by the authentication server, the authentication password of the terminal, wherein the authentication server authenticates the terminal according to the first verification value, if the first verification value is equal to the third verification value, The authentication server determines that the terminal is legal; if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid.
  • a fifth aspect provides a communication method, including: a terminal generating a first random number; and determining, by the terminal, an anchor key according to the first random number, the second random number, and a third random number; Encrypting the first random number to obtain an encrypted first random number; the terminal transmitting the encrypted first random number to an authentication server; and the authentication server is configured according to the encrypted first random number The second random number and the third random number determine the anchor key.
  • the second random number is generated by the terminal
  • the third random number is generated by the authentication server or generated by the mobility management device or by a data management device.
  • the method further includes: the authentication server receiving a third verification value from the terminal, the third verification value by the third random number, a terminal identifier of the terminal, and Determining, by the terminal, the registration password saved by the terminal; the authentication server acquiring the first verification value and the second verification value from the data management device; the authentication server is configured according to the first verification value and the third verification value
  • the terminal performs authentication; the authentication server sends the second verification value to the terminal when the result of authenticating the terminal is legal; the terminal saves itself according to the terminal identifier and the terminal
  • the registration password and the second random number determine a fourth verification value; the terminal authenticates the authentication server according to the second verification value and the fourth verification value.
  • the obtaining, by the authentication server, the first verification value and the second verification value from the data management device specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number;
  • the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number;
  • the authentication server receives the first verification value from the data management device and The second verification value.
  • a communication apparatus for performing the method of any of the first aspect or the first aspect of the first aspect.
  • the apparatus comprises means for performing the method of any of the first aspect or the first aspect of the first aspect described above.
  • a communication apparatus for performing the method of any of the possible implementations of the second aspect or the second aspect.
  • the apparatus comprises means for performing the method of any of the possible implementations of the second aspect or the second aspect described above.
  • a communication apparatus for performing the method of any of the possible implementations of the third aspect or the third aspect described above.
  • the apparatus comprises means for performing the method of any of the possible implementations of the third aspect or the third aspect described above.
  • a communication apparatus for performing the method of any of the above-described fourth or fourth possible implementations.
  • the apparatus comprises means for performing the method of any of the above-described fourth or fourth aspects of the fourth aspect.
  • a communication device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals
  • the apparatus is caused to perform the method of the first aspect or any of the possible implementations of the first aspect.
  • the memory may be a device other than the communication device.
  • a communication device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals
  • the apparatus is caused to perform the method of any of the possible implementations of the second aspect or the second aspect.
  • the memory may be a device other than the communication device.
  • the communication device comprises a chip in a terminal or a terminal.
  • a communication device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals
  • the apparatus is caused to perform the method of any of the possible implementations of the third aspect or the third aspect.
  • the memory may be a device other than the communication device.
  • a communication device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals
  • the apparatus is caused to perform the method of any of the possible implementations of the fourth aspect or the fourth aspect.
  • the memory may be a device other than the communication device.
  • a communication device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor.
  • the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals
  • the apparatus is caused to perform the method of any of the possible implementations of the fifth aspect or the fifth aspect.
  • the memory may be a device other than the communication device.
  • a fifteenth aspect a communication system comprising the apparatus of the sixth aspect or any alternative implementation thereof, and the apparatus of the seventh aspect or any alternative implementation thereof, optionally, further An apparatus in an eighth aspect, or any alternative implementation thereof.
  • the system comprises the apparatus of the eighth aspect or any alternative implementation thereof and the apparatus of the ninth aspect or any alternative implementation thereof.
  • the system includes the apparatus of the tenth aspect or any alternative implementation thereof, and the apparatus of the eleventh aspect or any alternative implementation thereof, optionally, further comprising the twelfth aspect or A device in any of the alternative implementations.
  • the system comprises the apparatus of the twelfth aspect or any alternative implementation thereof and the apparatus of the thirteenth aspect or any alternative implementation thereof.
  • a computer readable storage medium is provided, the instructions being stored in a computer readable storage medium, when executed on a computer, causing the computer to perform any of the first aspect or the first aspect The method in the implementation.
  • a computer readable storage medium is provided, the instructions being stored in the computer readable storage medium, when executed on a computer, causing the computer to perform any of the possible aspects of the second aspect or the second aspect The method in the implementation.
  • a computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the third or third aspects The method in the implementation.
  • a computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the fourth or fourth aspects The method in the implementation.
  • a computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the fifth or fifth aspects The method in the implementation.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspect or the first aspect of the first aspect.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described second or second aspect.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described third or third aspect.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described fourth or fourth aspects.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above fifth or fifth possible implementations.
  • the present application provides a communication chip in which an instruction is stored, when it is run on an authentication server or a terminal or a data management device, causing an authentication server or terminal or data management device to perform the above aspects Any method.
  • FIG. 1 is a system architecture diagram provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an authentication method provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of another authentication method provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another communication method provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of still another communication method provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of still another communication method provided by an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of another communication apparatus provided by an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a communication system provided by an embodiment of the present application.
  • FIG. 13 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.
  • FIG. 14 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.
  • FIG. 15 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • FIG. 1 is a system architecture diagram provided by an embodiment of the present application, including:
  • the terminal 110 may be referred to as a user equipment (UE), a mobile station (MS), a mobile terminal, or a terminal in a future 5G network, and the terminal may pass through a radio access network (radio).
  • the access network (RAN) device communicates with one or more core network devices, for example, the terminal may be a mobile phone (or "cellular" phone) or a computer with a mobile terminal, etc., for example, the terminal may be a next generation family A next generation-residential gateway (NG-RG), for example, the terminal may also be a portable, pocket-sized, handheld, computer-integrated or in-vehicle mobile device that exchanges voice and/or data with the wireless access network.
  • the terminal 110 can be used to negotiate with the authentication server 120 to determine an authentication method used to authenticate the terminal 110.
  • the terminal 110 can also be used to authenticate the authentication server 120.
  • Terminal 110 can also be used to generate an anchor key.
  • the authentication server 120 is configured to negotiate with the terminal 110 to determine an authentication method used to authenticate the terminal 110.
  • the authentication server 120 can also be used to authenticate the terminal 110.
  • the authentication server 120 can also be used to generate an anchor key.
  • the terminal 110 negotiates with the authentication server 120 to determine an authentication method used to authenticate the terminal 110.
  • the terminal 110 and the authentication server 120 authenticate each other using the authentication method.
  • the terminal 110 and the authentication server 120 may generate an anchor key for the terminal to communicate with other devices.
  • FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application, including: a terminal 110, an access network device 130, and a core network device 140.
  • the access network device 130 may be a base station controller (BSC) in GSM or CDMA, or a radio node controller (RNC) in WCDMA, or may be an evolved type in LTE.
  • the base station evolved node B, eNB or e-NodeB
  • the access network device 120 may be
  • the shared access network device may be, for example, an access network device shared by a plurality of public land mobile networks (PLMNs).
  • PLMNs public land mobile networks
  • the core network device 140 may include: an access and mobility management function (AMF) device 141, an authentication server function (AUSF) device 142, and a unified data management (UDM) device. 143.
  • the core network device may further include a mobility management entity (MME), a policy control function (PCF) device, a user port function (UPF) device, and an AF.
  • MME mobility management entity
  • PCF policy control function
  • UPF user port function
  • AF home subscriber server
  • HSS home subscriber server
  • the AMF 141 is configured to transparently pass the authentication message, and encrypt and protect the user plane data and the signaling plane data according to the anchor key generated by the AUSF 142.
  • the AUSF 142 can authenticate the terminal or generate an anchor key to be sent to the AMF 141, so that the AMF protects the signaling plane data and the user plane data according to the anchor key.
  • the UDM 143 may return an authentication message to the corresponding terminal according to the terminal identifier of the terminal, for example, a message indicating whether the authentication is passed.
  • the authentication server 120 in FIG. 1 may be the AUSF 142 in FIG. 2.
  • the mobility management device (the mobility management device may be AMF or MME), the authentication server, the data management device, and the like are only one name, and the name itself does not limit the entity.
  • the mobility management device may also be replaced with an "access and mobility management function" or other name.
  • the mobility management device may also correspond to a network element that includes other functions in addition to the access and mobility management functions.
  • the authentication server may also be replaced with an "authentication service function" or other name, and the authentication server may also correspond to an network element including other functions in addition to the authentication service.
  • a unified explanation is given here, and will not be described below.
  • the words “first”, “second”, and the like are used to distinguish the same items or similar items whose functions and functions are substantially the same. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the number and execution order, and the words “first”, “second” and the like are not necessarily limited.
  • the EAP Before the terminal and the access network device or the core network device transmit data, the EAP is used for authentication.
  • the terminal is NG-RG in the method 200.
  • the authentication server is an AUSF
  • the data management device is a UDM as an example.
  • the method 200 includes the following steps:
  • the terminal sends an EAP message to the AUSF, where the EAP message carries the terminal identifier of the terminal, for example, may be an identity (ID) of the terminal.
  • the EAP message carries the terminal identifier of the terminal, for example, may be an identity (ID) of the terminal.
  • the AUSF receives the EAP message sent by the terminal, and selects an authentication method for the terminal.
  • the authentication method may be an EAP-challenge handshake authentication protocol (EAP-CHAP) based on account password authentication, and an EAP-CHSCH protocol version 2 (EAP-mschapv2).
  • EAP-PAP EAP-Password Authentication Protocol
  • USIM universal subscriber identity module
  • EAP-AKA' Authentication and key agreement
  • EAP-AKA EAP-authentication and key agreement
  • EAP-SIM extensible authentication protocol - EAP-Subscriber Identity Module
  • the method may also be an EAP-transport layer security (EAP-TLS) based on certificate authentication, and an EAP-tunnel transport layer security (EAP-TT) based on certificate authentication.
  • EAP-TLS EAP-transport layer security
  • EAP-TT EAP-tunnel transport layer security
  • the AUSF generates a random number RAND-ausf.
  • the AUSF sends a first message to the terminal, where the first message carries the random number RAND-ausf generated by the AUSF.
  • the first message may be a challenge message in EAP-MschapV2.
  • the terminal receives the first message sent by the AUSF, and determines the first hash value according to the RAND-ausf carried in the first message, the terminal identifier of the terminal, and the registration password saved by the terminal, for example, the RFC draft-kamath- Pppext-eap-mschapv2-02" calculates the hash value.
  • the terminal generates a random number RAND-rg.
  • the terminal sends a second message to the AUSF, where the second message carries the RAND-rg and the first hash value.
  • the first message is the challenge message of the EAP-MschapV2
  • the second message may be the response of the EAP-MschapV2.
  • the UDM stores the registration password of the terminal, and the UDM sends the registration password of the terminal to the AUSF.
  • the UDM may actively send the registration password of the terminal to the AUSF, or may send the registration password of the terminal to the AUSF based on the AUSF request.
  • the AUSF receives the second message sent by the terminal, and determines a second hash value according to the RAND-ausf, the terminal identifier of the terminal, and the registration password of the terminal acquired by the AUSF, and the method for determining the second hash value and determining the first hash.
  • the method of the Greek value is the same.
  • the AUSF authenticates the terminal with the first hash value and the second hash value.
  • the AUSF considers the terminal legal. If the first hash value is not equal to the second hash value, the AUSF considers that the terminal is invalid, and returns a reject message to the terminal.
  • the AUSF determines the third hash value by using the RAND-rg, the terminal identifier of the terminal, and the registration password of the terminal acquired by the AUSF, and the method for determining the third hash value is the same as the method for determining the first hash value.
  • the AUSF sends a third message to the terminal.
  • the third message has a third hash value. If the AUSF selects the EAP-mschapv2 method in S202, the third message may be a success request message of the EAP-MschapV2.
  • the terminal receives the third message sent by the AUSF, and determines the fourth hash value by using the RANG-rg, the terminal identifier of the terminal, and the AUSF, and the terminal authenticates the AUSF by using the third hash value and the fourth hash value.
  • the terminal considers the AUSF to be legal. If the third hash value is not equal to the fourth hash value, the terminal considers the AUSF to be illegal.
  • the terminal determines the anchor key by using RANG-rg, RAND-ausf, and the registration password saved by itself. For the specific determination method, refer to RFC 2759 "Microsoft PPP CHAP Extensions, Version 2".
  • the terminal sends an authentication pass message to the AUSF, to indicate that the AUSF verification is passed.
  • the AUSF determines the anchor key by using RANG-rg, RAND-ausf, and the acquired registration password of the terminal.
  • the AUSF sends an anchor key to the AMF, so that the terminal and the AMF use the anchor key to transmit the signaling plane data and the user plane data.
  • S213 may precede S207 after S206, and S215 may also wait before S207 and after S208.
  • S208 may be any step before S209, which is not limited by the embodiment of the present application.
  • the authentication method selected by the AUSF may not be the authentication method supported by the terminal.
  • the AUSF and the terminal are required to perform multiple signaling interactions to determine the final authentication method, which will increase.
  • the signaling overhead and the delay are high.
  • the process of signaling interaction is as shown in FIG. 4, and includes the following steps:
  • the terminal sends the terminal identifier of the terminal to the AUSF, where the terminal identifier of the terminal may be the ID of the terminal.
  • the AUSF After receiving the terminal identifier of the terminal, the AUSF selects the first authentication method according to the terminal identifier of the terminal. It should be understood that it is possible that the AUSF may select different authentication methods according to the terminal identification of the same terminal.
  • the AUSF sends the start message of the selected first authentication method to the terminal. For example, if the AUSF selects the EAP-SIM as the first authentication method, the start message of the first authentication method is a start message, and the start message indicates that the start message is started. EAP-SIM certification.
  • the terminal may not support the first authentication method.
  • the terminal supports the second authentication method, where the second authentication method may be the EAP-MSchapv2 method and the EAP-AKA'
  • the terminal sends an EAP-NAK message to the AUSF, where the EAP-NAK message indicates that the terminal does not support the first authentication method, and the EAP-NAK message carries the second authentication method supported by the terminal (EAP-MSchapv2 method and EAP-AKA' method) ).
  • the AUSF reselects the authentication method according to the second authentication method supported by the terminal carried in the EAP-NAK message.
  • the reselected authentication method is the EAP-MSchapv2 method.
  • the AUSF sends a start message of the second authentication method to the terminal.
  • the start message of the second authentication method may be a challenge message.
  • the registration password of the terminal used to calculate the second hash value and the third hash value calculated in S210 in S209 needs to be obtained from the UDM, for example, by S208, so that the registration password of the terminal is in UDM and AUSF.
  • the transmission is interrupted, it is easily intercepted by the attacker, which may result in the leakage of the terminal registration password, which may further cause the attacker to forge the second hash value and the third hash value, thereby affecting the accuracy of mutual authentication between the terminal and the AUSF.
  • the anchor key is determined by using the registration password of the terminal, RAND-rg, and RAND-ausf. Since RAND-rg and RAND-ausf are transmitted in clear text between the terminal and the AUSF, it is easy to leak. If the terminal's registration password is cracked by the attacker, the attacker can forge the anchor key, which will limit the security of the transmitted data.
  • At least one authentication method supported by the terminal may be carried in the message that the terminal initiates registration with the authentication server, so that the authentication server can be supported by the terminal when selecting the authentication method.
  • At least one authentication method and at least one authentication method supported by the authentication server select an authentication method used to authenticate the terminal. For example, an intersection method is adopted in at least one authentication method supported by the terminal and an authentication method supported by the authentication server, and an authentication method used for authenticating the terminal is selected in the intersection.
  • the data management device can calculate the verification value required at the time of authentication, and send the verification value to the authentication server, for example, the verification value can be the second hash value.
  • the third hash value in this way, the intercepted situation caused by the transmission of the terminal's registration password between the authentication server and the data management device can be avoided.
  • the random number can be used to calculate the anchor key, and the random number can be used to replace the registration password of the terminal to avoid when the terminal registration password is intercepted. The situation in which security is limited.
  • FIG. 5 shows a communication method 400 provided by an embodiment of the present application.
  • the method 400 includes:
  • the terminal acquires a first random number.
  • the first random number may be generated by the terminal or sent by the other device and sent to the terminal.
  • the first random number is used to generate the anchor key instead of the registration password of the terminal.
  • the terminal generates the first random number every time the session is established.
  • the first random number can be periodically updated.
  • the update frequency of the first random number can be determined according to the security requirements of the network. For example, if the security of the current network is good, the first random number is The update frequency of the number is low, and the current network security is poor.
  • the update frequency of the first random number is high.
  • the update frequency of the first random number is fixed, and may be updated every hour.
  • the terminal determines, according to the first random number, the second random number, and the third random number, an anchor key, where the anchor key is used for communication by the terminal.
  • the terminal and the authentication server may also perform mutual authentication by using the second random number and the third random number.
  • the authentication server determines that the terminal is legal, and if the terminal determines that the authentication server is legal, the terminal and the authentication server use the second.
  • the random number and the third random number determine the anchor key.
  • the second random number may be generated by a terminal.
  • the method further includes: the terminal acquiring the third random number, for example, the terminal receiving the third random number from the authentication server. That is, in the embodiment of the present application, the terminal determines the session key according to the first random number acquired by itself, the second random number generated by itself, and the third random number from the authentication server.
  • the terminal encrypts the first random number to obtain an encrypted first random number.
  • the terminal sends the encrypted first random number to an authentication server.
  • the authentication server receives the encrypted first random number from the terminal.
  • the authentication server can be an AUSF.
  • S430 includes: the terminal encrypting the first random number by using a first key to obtain an encrypted first random number.
  • the authentication server determines an anchor key according to the encrypted first random number, the second random number, and the third random number.
  • the authentication server obtains the second random number and the third random number.
  • the authentication server may receive the second random number sent by the terminal, the authentication server itself determines the third random number, or the authentication server receives the data from the data.
  • the third random number of the device is managed, or the authentication service receives a third random number from the mobility management device.
  • S440 includes: the authentication server decrypts the encrypted first random number by using a second key to obtain the first random number, where the second key is a key corresponding to the first key, that is, the second key is used to decrypt information encrypted using the first key; the authentication server uses the first random number, the second random number, and the first The three random numbers determine the anchor key.
  • the authentication server decrypts the encrypted first random number by using a second key to obtain a first random number, and the authentication server uses the first random number, the second random number, and The third random number generates the anchor key.
  • the first random number can be used to replace the registration password of the terminal to determine the anchor key, and the accuracy of determining the anchor key can be improved, and the random number is also random, and can be changed frequently, for example, by the terminal.
  • the session is generated when the session is established, which avoids the security problem caused by the long-term use of the fixed terminal registration password.
  • the first key and the second key may be a pair of asymmetric keys, the first key is a public key, and the second key is a private key.
  • the first key and the second key are a pair of symmetric keys, that is, the first key and the second key are the same, for example, the first key and the second key are A pair of identical keys generated by the Diffie-Hellman (DH) algorithm.
  • DH Diffie-Hellman
  • the authentication server needs to provide services for multiple terminals at the same time. Therefore, the authentication server can store keys corresponding to different terminals. After the authentication server receives the encrypted first random number sent by the terminal, the authentication server can Determining a second key for decrypting the encrypted first random number among the plurality of keys saved by the terminal according to the identifier of the terminal.
  • the authentication server sends the anchor key to the mobility management device. In this way, the mobility management device communicates with the terminal according to the anchor key.
  • the terminal may communicate with the mobility management device according to the anchor key, or the terminal may communicate with the access network device according to the anchor key.
  • the anchor key may be a key used to transmit control plane data, or may be a key used to transmit user plane data.
  • the lower layer key may be generated according to the anchor key, and different devices use the lower layer key to communicate.
  • the mobility management device and the terminal may generate a second anchor key and a third anchor key according to the anchor key, where the second anchor key is used for the terminal to communicate with the mobility management device, and second The anchor key is used by the terminal to communicate with the access network device.
  • the mobility device and the terminal may generate a fourth anchor key, a fifth anchor key, a sixth anchor key, and a seventh anchor key according to the anchor key, and the fourth key is used for the terminal. Controlling surface data communication with the mobility management device, the fifth key is used for communication between the terminal and the mobile device for user plane data, and the sixth key is used for communication between the terminal and the access network device for control plane data, The seven keys are used for communication between the terminal and the access network device for user plane data.
  • the terminal and the authentication server may perform mutual authentication before the terminal and the authentication server determine the anchor key.
  • an authentication method in which the terminal and the authentication server perform mutual authentication may be determined.
  • the method further includes: the authentication server receiving one or two or more authentication methods supported by the terminal by the terminal; the authentication server is based on one or two or more supported by the terminal.
  • the authentication method and the authentication method supported by itself determine the first authentication method used to authenticate the terminal.
  • the terminal carries one or two or more authentication methods supported by the terminal in the registration message sent by the terminal, where the authentication server receives the registration message sent by the terminal, in the registration message.
  • the authentication server may take the intersection of one or two or more authentication methods supported by the terminal and the authentication method supported by the terminal. If the intersection includes only one element, that is, one authentication method, the authentication method is the first authentication. method. If the intersection includes more than two elements, that is, two or more authentication methods, the authentication method may be any one of the two or more authentication methods.
  • the terminal supports the authentication method 1, the authentication method 2, and the authentication method 3.
  • the authentication server supports the authentication method 2, the authentication method 3, and the authentication method 4.
  • the authentication server may select one of the authentication method 2 and the authentication method 3 as the terminal.
  • the authentication server receives one or two or more authentication methods supported by the terminal and the priority of each one of the one or two or more authentication methods. Determining, by the authentication server, a first authentication method used for performing authentication on the terminal according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, including: The authentication server determines the first authentication method according to a priority of each of the one or more authentication methods supported by the terminal and an authentication method supported by the authentication server. For example, the authentication server may take an intersection in one or more authentication methods supported by the terminal and an authentication method supported by the authentication server itself. If the intersection includes only one element, that is, an authentication method, the authentication method is first.
  • the authentication server may preferentially select the authentication method with higher priority in the intersection as the first authentication method.
  • the authentication server determines an authentication method used to perform authentication on the terminal according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, so that the terminal and the authentication server can be avoided. Signaling overhead caused by signaling interaction.
  • the terminal supports the authentication method 1, the authentication method 2, and the authentication method 3.
  • the priority of the authentication method 3 is higher than the priority of the authentication method 2
  • the priority of the authentication method 2 is higher than the priority of the authentication method 1
  • the authentication server supports the authentication.
  • the authentication server may select the authentication method 3 as the first authentication method in the authentication method 2 and the authentication method 3.
  • the identifier of the first authentication method may be sent to the data management device, so that the data management device saves the identifier of the first authentication method to related information of the terminal.
  • the data management device may not receive the identifier of the first authentication method, but determine the first verification value and the second verification value according to the preset authentication method. This embodiment of the present application does not limit this.
  • the method 400 further includes: the authentication server acquiring a first verification value and a second verification value from the data management device; the authentication server authenticating the terminal according to the first verification value .
  • the authentication server sends the second verification value to the terminal when the result of authenticating the terminal is legal, so that the terminal can authenticate the authentication server according to the second verification value.
  • the foregoing determining the anchor key may be after the authentication server authenticates the terminal according to the first verification value, that is, when the authentication server authenticates the terminal, the authentication server and the terminal determine the anchor again. Point key.
  • the authentication server obtains the first verification value and the second verification value from the data management device, specifically: sending, to the data management device, the terminal identifier of the terminal, the second random number, and The third random number receives the first verification value and the second verification value sent by the data management device.
  • the first verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the third random number.
  • the first verification value is used by the data management device to use the first authentication.
  • the method is determined according to the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number.
  • the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number.
  • the second verification value is determined by the data management device using the first authentication method according to the terminal identification, the registration password of the terminal held by the data management device, and the second random number.
  • the authentication process of the authentication server to the terminal includes the following steps:
  • the authentication server sends the third random number to the terminal.
  • the terminal receives the third random number from the authentication server, and determines a third verification value according to the terminal identifier of the terminal, the third random number, and a registration password saved by the terminal.
  • the third authentication value is determined according to the terminal identifier, the third random number, and the registration password saved by the terminal by using the first authentication method.
  • the terminal sends the third verification value to the authentication server, the authentication server receives a third verification value sent by the terminal, and pairs the terminal according to the third verification value and the first verification value.
  • Validity of the legality Specifically, if the third verification value is equal to the first verification value, the authentication server determines that the terminal is legal; if the third verification value is not equal to the first verification value, the authentication The server determines that the terminal is illegal.
  • the authentication server sends a reject message to the terminal, to indicate that the terminal is rejected by the authentication server because it is illegal.
  • first verification value and the third verification value are obtained by the same authentication method.
  • first verification value and the third verification value may be obtained by using a preset authentication method or the foregoing first authentication method.
  • the authentication process of the terminal to the authentication server includes the following steps:
  • the data management device determines a second verification value according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and a second random number.
  • the data management device sends the second verification value to the authentication server.
  • the authentication server receives the second verification value sent by the data management device, and sends the second verification value to the terminal.
  • the terminal receives the second verification value sent by the authentication server, and the terminal determines a fourth verification value according to the terminal identifier of the terminal, the registration password saved by the terminal, and the second random number.
  • the terminal authenticates the validity of the authentication server according to the second verification value and the fourth verification value. Specifically, if the second verification value is equal to the fourth verification value, the terminal determines that the authentication server is legal; if the second verification value is not equal to the fourth verification value, the terminal It is determined that the authentication server is illegal. Optionally, when the terminal determines that the authentication server is invalid, the terminal sends a reject message to the authentication server, to indicate that the authentication server is rejected by the terminal because it is illegal.
  • the second verification value and the fourth verification value are obtained by the same authentication method.
  • the second verification value and the fourth verification value may be obtained by using the foregoing first authentication method or a preset authentication method.
  • the terminal and the authentication server may mutually authenticate each other.
  • each of the anchor keys is determined, that is, step 420 and step 440 are performed, where the second random number and the first use of the anchor key are determined.
  • the three random numbers are the random numbers used in the mutual authentication process.
  • first verification value and the third verification value are obtained by the same authentication method.
  • the second verification value and the fourth verification value are obtained by the same authentication method.
  • the same authentication method may be a preset authentication method, or an authentication method determined by the authentication server and the terminal.
  • the foregoing first verification value, second verification value, third verification value, and fourth verification value may be four hash values obtained by using a hash algorithm.
  • the foregoing first verification value, the second verification value, the third verification value, and the fourth verification value may also be obtained by using another authentication algorithm, and the authentication algorithm used by the terminal and the authentication server in the authentication process in the embodiment of the present application. No restrictions.
  • the first random number generated by the terminal is generated, and the encrypted first random number can be sent to the authentication server.
  • the authentication server may also generate a first random number, and send the encrypted first random number to the terminal.
  • the third-party device may generate the first random number, and send the encrypted first random number to the authentication server and the terminal.
  • the method for generating the first random number is not limited in this embodiment.
  • the algorithm used to determine the anchor key may be a hash algorithm or a pseudo-random function (PRF) algorithm. There is no limit to what algorithm is used to calculate the anchor key.
  • PRF pseudo-random function
  • FIG. 6 shows a communication method 500 provided by an embodiment of the present application.
  • the method 500 includes:
  • the authentication server sends the terminal identifier, the second random number, and the third random number of the terminal to the data management device; the data management device receives the terminal identifier of the terminal sent by the authentication server, Two random numbers and the third random number.
  • the method further includes: the authentication server acquiring the terminal identifier, the second random number, and the third random number of the terminal.
  • the registration message sent by the terminal to the authentication server carries the terminal identifier of the terminal, and the authentication server obtains the terminal identifier of the terminal in the registration message.
  • the second random number may be generated by the terminal, where the terminal sends the second random number to the authentication request message sent by the authentication server, where the authentication server obtains the second random number in the authentication request message.
  • the terminal may send the terminal identifier of the terminal and the second random number to the authentication server in the same message.
  • the embodiment of the present application does not limit the manner in which the authentication server obtains the terminal identifier and the second random number of the terminal.
  • the third random number may be generated by the authentication server, or may be generated by other devices on the network side and sent to the authentication server.
  • the data management device determines a first verification value and a second verification value according to the terminal identifier of the terminal, the second random number, and the third random number.
  • the data management device determines the second verification according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and the second random number.
  • a value for example, determining, by the first authentication method, the second verification value according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and the second random number, the first authentication method
  • the method may be a preset authentication method, or may be determined by the authentication server and the terminal to be determined and sent to the data management device; the data management device is configured according to the terminal identifier of the terminal, and the terminal registration of the data management device
  • the password and the third random number determine the first verification value, for example, using a first authentication method according to a terminal identifier of the terminal, a registration password of the terminal saved by the data management device, and the third random number
  • the number determines the first verification, the first authentication method may be a preset authentication method, or the authentication server negotiates with the terminal to determine and Sent to the data management device.
  • the data management device sends the first verification value and the second verification value to the authentication server.
  • the authentication server authenticates the terminal according to the first verification value.
  • the authentication server sends a second verification value to the terminal when the result of authenticating the terminal is legal, and the terminal receives the second verification value sent by the authentication server.
  • the terminal authenticates the authentication server according to the second verification value.
  • the data management device may generate the first verification value and the second verification value.
  • the first verification may be generated by using the registration password of the terminal saved by the data management device. The value and the second verification value, so that the leakage of the registration password caused by the transmission password of the terminal between the authentication server and the data management device can be avoided, thereby improving data security.
  • FIG. 7 shows a communication method 600 provided by an embodiment of the present application.
  • the following describes an example in which the terminal is an NG-RG, the authentication server is an AUSF, and the data management device is a UDM.
  • the method 600 includes:
  • the NG-RG determines the first key
  • the AUSF determines the second key
  • the first key and the second key are a pair of asymmetric keys, that is, the first key may be a public key, and the second key may be a private key.
  • the first key and the second key may also be the same pair of symmetric keys.
  • the first key and the second key may be a pair of identical keys determined by the DH algorithm.
  • the NG-RG When sending the registration message to the AUSF, the NG-RG carries the ID of the NG-RG and the authentication method supported by the NG-RG in the registration message, for example, the registration message may be an EAP message.
  • the AUSF receives the registration message sent by the AN-RG, obtains the ID of the NG-RG and the authentication method supported by the NG-RG in the registration message, and selects the NG- according to the authentication method supported by the NG-RG and the authentication method supported by the AUSF.
  • the AUSF obtains a random number RAND-ausf, where RAND-ausf may be the foregoing third random number.
  • the AUSF obtains the random number RAND-ausf, which may include the following methods: AUSF may generate RAND-ausf by itself; or AUSF may request a random number from UDM, UDM generates RAND-ausf, and sends RAND-ausf to AUSF; or The AUSF requests a random number from the AMF, and the AMF generates a RAND-AUSF, and sends the generated RAND-ausf to the AUSF.
  • the embodiment of the present application does not limit how the AUSF obtains the RAND-ausf.
  • the AUSF sends a first message to the NG-RG, where the first message carries RAND-ausf, and the first message is used to request the NG-RG to authenticate the NG-RG.
  • the first message carries an authentication method used by the AUSF to authenticate the NG-RG.
  • the first message may be an EAP-MschapV2 challenge message indicating that the AUSF has selected EAP-MSchapv2.
  • An authentication method for authenticating NG-RG An authentication method for authenticating NG-RG.
  • the NG-RG receives the first message sent by the AUSF, and acquires RAND-ausf in the first message. Further, the first hash value may be determined according to the ID of the NG-RG, the registration password of the NG-RG, and the obtained RAND-ausf. For example, the calculation method can be referred to RFC "draft-kamath-pppext-eap-mschapv2-02". Optionally, the first hash value may be the foregoing third verification value.
  • NG-RG generates a random number RAND-rg.
  • RAND-rg may be the aforementioned second random number.
  • the NG-RG sends a second message to the AUSF, where the second message carries the RAND-rg and the first hash value. If the SAP determines that the EAP-MSchapv2 is the authentication method used for authenticating the NG-RG, The second message carries the EAP-MschapV2-Response message.
  • the second message may be a response message of the first message, and the second message is used to indicate that the NG-RG accepts the authentication of the AUSF.
  • the AUSF receives the second message sent by the NG-RG, and obtains the RAND-rg and the first hash value in the second message.
  • the AUSF sends a fourth message to the UDM, where the fourth message carries the ID of the NG-RG, RAND-rg and RAND-ausf, and the fourth message is used to request the UDM for the parameters required for authenticating the NG-RG.
  • the UDM receives the fourth message sent by the AUSF, and obtains the ID, RAND-rg, and RAND-ausf of the NG-RG in the fourth message. Further, the UDM determines the second hash value and the third hash value according to the ID of the NG-RG, the RAND-rg, the RAND-ausf, and the registration password of the NG-RG saved by the UDM.
  • the second hash value may be The foregoing first verification value
  • the third hash value may be the foregoing second verification value.
  • the UDM determines a second hash value by using an ID of NG-RG, RAND-ausf, and a registration password of the NG-RG saved by the UDM; the UDM is saved by using the ID of NG-RG, RAND-rg, and UDM The registration password of the NG-RG determines the third hash value.
  • the UDM sends a fifth message to the AUSF, where the fifth message is used to send a parameter required for authenticating the NG-RG to the AUSF.
  • the fifth message carries the second hash value and the third hash value determined in S610.
  • the AUSF receives the fifth message sent by the UDM, and obtains the second hash value and the third hash value in the fifth message. Further, the AUSF verifies the legality of the NG-RG by using the second hash value and the first hash value obtained in S609. If the first hash value is equal to the second hash value, the AUSF determines the NG-RG. legitimate. If the first hash value is not equal to the second hash value, the AUSF determines that the NG-RG is invalid.
  • the AUSF sends a third message to the NG-RG, where the third message carries a third hash value.
  • the third message is used to request the NG-RG to authenticate the AUSF.
  • the NG-RG receives the third message sent by the AUSF, and obtains the third hash value in the third message.
  • the NG-RG determines the fourth hash value using the ID of the NG-RG, RAND-rg, and its own registration password.
  • the NG-RG determines that the fourth hash value may be used before or after the NG-RG receives the third message sent by the AUSF, which is not limited by the embodiment of the present application.
  • the NG-RG authenticates the legality of the AUSF by using the third hash value and the fourth hash value.
  • the NG-RG determines that the AUSF is legal, and if the third hash value is not equal to the fourth hash value, the NG-RG determines that the AUSF is invalid.
  • the NG-RG obtains a random number pre-master-key, for example, the pre-master-key may be the foregoing first random number.
  • the embodiment of the present application does not limit the sequence of S616.
  • S616 may precede any step in S601-S615. That is to say, S616 may be generated after the NG-RG and the AUSF mutually authenticate each other, or may be generated before the NG-RG and the AUSF mutually authenticate pass.
  • the NG-RG maintains a random number (ie, pre-master-key) for generating an anchor key, and the random number is periodically updated. For example, the random number can be updated every 1 hour. When the NG-RG needs to generate an anchor key, the random number is obtained.
  • the NG-RG determines the anchor key according to the random numbers pre-master-key, RAND-ausf, and RAND-rg.
  • the anchor key may be calculated by using a hash algorithm or a PRF algorithm.
  • the embodiment of the present application does not limit the sequence of S617, as long as the NG-RG obtains three random numbers, for example, S617 may be after S607 and before S608.
  • S617 may be performed after the NG-RG verifies that the AUSF is legal. It should be noted that the specific method for generating an anchor key for the NG-RG is not limited in this embodiment of the present application.
  • the NG-RG encrypts the random number pre-master-key by using the first key in S601 to obtain an encrypted pre-master-key, and the encrypted pre-master-key may be referred to as a pre-master- Secret.
  • the random number used to generate the anchor key is encrypted and transmitted first, which can effectively ensure that the random number used to generate the anchor key is not leaked during transmission.
  • the NG-RG sends a sixth message to the AUSF, where the sixth message carries a pre-master-secret.
  • the sixth message is further used to indicate that the NG-RG passes the AUSF authentication.
  • the sixth message may be the verification pass message in S214 in method 200.
  • the AUSF receives the sixth message sent by the NG-RG, obtains the pre-master-secret in the sixth message, and decrypts the pre-master-secret by using the second key in S601 to obtain a pre-master-key.
  • the authentication server needs to provide services for multiple NG-RGs at the same time. Therefore, the authentication server can store keys corresponding to different NG-RGs. After the authentication server receives the pre-master-secret, the authentication server can perform the NG according to the NG. The identifier of the -RG determines a second key for decrypting the encrypted first random number among the plurality of keys stored by itself, thereby decrypting the pre-master-secret with the second key to obtain a pre-master- Key.
  • the AUSF determines the anchor key using the pre-master-key, RAND-ausf, and RAND-rg obtained by S620.
  • the AUSF sends the anchor key to the AMF device, and the AMF communicates with the NG-RG according to the anchor key. For example, communication between the control plane data and the user plane data can be performed.
  • the first key determined by the NG-RG and the second key determined by the AUSF, the first key and the second key may be a pair of symmetric keys, for example, according to the DH algorithm. a pair of keys.
  • the process of determining the first key and the second key includes the following steps:
  • the registration message sent by the NG-RG to the AUSF may carry the supported capability set of the DH, and the capability set supported by the DH includes some common parameters used to generate the key, for example, the common parameters may be multiple prime numbers. And multiple original roots.
  • the AUSF receives the registration message sent by the NG-RG, and obtains the capability set supported by the DH in the registration message, and the AUSF determines the “selected DH capability” and the NG-RG “initiated DH capability” in the capability set supported by the DH.
  • the AUSF generates a first parameter AUSF-priv and a second parameter AUSF-pub of the DH according to the "selected DH capability" and the NG-RG "initiated DH capability".
  • the AUSF sends the second parameter AUSF-pub and the "selected DH capability" and the NG-RG "initiated DH capability" to the NG-RG through the first message in S605.
  • the NG-RG receives the first message sent by the AUSF, and obtains the prime number and the original root selected by the AUSF and the second parameter AUSF-pub in the first message, and the NG-RG generates the DH according to the prime number selected by the AUSF and the original root.
  • the NG-RG generates a first key according to the third parameter RG-priv and the second parameter AUSF-pub.
  • the NG-RG may send the fourth parameter RG-pub to the AUSF by using the second message in S608.
  • the AUSF generates a second key according to the fourth parameter RG-pub and the first parameter AUSF-priv, where the second key is the same as the first key.
  • the NG-RG may encrypt the first random number by using the first key
  • the AUSF may decrypt the encrypted first random number by using the second key to obtain the first random number. number.
  • the communication method according to the embodiment of the present application is described in detail above with reference to FIG. 1 to FIG. 8.
  • the communication device according to the embodiment of the present application will be described in detail below with reference to FIG. 9 to FIG.
  • FIG. 9 shows a communication device 800 provided by an embodiment of the present application.
  • the device 800 includes:
  • the transceiver unit 810 is configured to receive the encrypted first random number from the terminal;
  • the processing unit 820 is configured to determine, according to the encrypted first random number, the second random number, and the third random number, an anchor key
  • the transceiver unit 810 is further configured to send the anchor key to the mobility management device.
  • the anchor key is used by the mobility management device to communicate.
  • the second random number is generated by a terminal, the third random number being generated by the device or generated by the mobility management device or generated by a data management device.
  • the transceiver unit 810 is further configured to: acquire a first verification value and a second verification value from the data management device; the processing unit is further configured to perform, according to the first verification value, the terminal The transceiver unit is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal.
  • the transceiver unit 810 is further configured to: send the terminal identifier of the terminal, the second random number, and the third random number to the data management device; receive the data management from the terminal The first verification value and the second verification value of the device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and the third random number Determining; the second verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the second random number.
  • the transceiver unit 810 is further configured to: receive a third verification value sent by the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and The processing unit 820 is configured to determine that the terminal is legal if the first verification value is equal to the third verification value.
  • the transceiver unit 810 is further configured to: before receiving the first verification value and the second verification value from the data management device, receive one or two of the terminal support from the terminal, and
  • the above-mentioned authentication method is further configured to: determine, according to one or two or more authentication methods supported by the terminal, and an authentication method supported by the authentication server, determine the authentication used by the terminal The first method of authentication.
  • the transceiver unit 810 is further configured to: receive one or two or more authentication methods supported by the terminal from the terminal, and the one or two or more authentication methods. The priority of each authentication method;
  • the processing unit 820 is specifically configured to: determine the first authentication method according to a priority of each of the one or two or more authentication methods supported by the terminal, and an authentication method supported by the authentication server. .
  • the encrypted first random number is obtained by encrypting the first random number by using the first key; the processing unit 820 is specifically configured to: use the second key to pair the encrypted Decrypting the first random number to obtain the first random number, wherein the second key is a key corresponding to the first key; using the first random number, the second random number, and the first The three random numbers determine the anchor key.
  • the first key and the second key are a pair of keys generated according to a Diffie-Hellmann DH algorithm.
  • the apparatus 800 herein is embodied in the form of a functional unit.
  • the term "unit” as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality.
  • ASIC application specific integrated circuit
  • the device 800 may be specifically an authentication server in the foregoing method embodiment, and the device 80 may be used to execute various processes and/or steps corresponding to the authentication server in the foregoing method embodiment. To avoid repetition, we will not repeat them here.
  • FIG. 10 shows a communication device 900 provided by an embodiment of the present application.
  • the device 900 includes:
  • the processing unit 910 is configured to generate a first random number.
  • the processing unit 910 is further configured to determine, according to the first random number, the second random number, and the third random number, an anchor key, where the anchor key is used for the terminal communication.
  • the processing unit is further configured to: encrypt the first random number to obtain an encrypted first random number; and the device further includes: a first transceiver unit 920, configured to authenticate The server sends the encrypted first random number.
  • the second random number is generated by the apparatus, and the third random number is generated by the authentication server or a mobility management device or a data management device.
  • the apparatus further includes: a second transceiver unit, configured to receive a second verification value sent by the data management device by the authentication server, where the second verification value is used by the device of the device The identifier, the registration password of the device saved by the data management device, and the second random number determined.
  • the processing unit is further configured to: determine a fourth verification value according to the device end identifier, the registration password saved by the device, and the second random number; according to the second verification value and the fourth verification The value authenticates the authentication server.
  • the device further includes: a third transceiver unit, configured to send, by the authentication server, one or two or more authentication methods supported by the terminal.
  • the third transceiver unit is specifically configured to: send, to the authentication server, one or two or more authentication methods supported by the terminal, and the one or two or more authentications. The priority of each authentication method in the method.
  • the apparatus 900 herein is embodied in the form of a functional unit.
  • the term "unit” as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality.
  • ASIC application specific integrated circuit
  • the device 900 may be specifically the terminal in the foregoing method embodiment, and the device 900 may be used to perform various processes and/or steps corresponding to the terminal in the foregoing method embodiment. Avoid repetition and we will not repeat them here.
  • FIG. 11 shows a communication device 1000 provided by an embodiment of the present application.
  • the device 1000 includes:
  • the transceiver unit 1010 is configured to obtain a first verification value and a second verification value from the data management device.
  • the processing unit 1020 is configured to perform authentication on the terminal according to the first verification value.
  • the transceiver unit 1010 is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal.
  • the transceiver unit 1010 is further configured to: send the terminal identifier of the terminal, the second random number, and the third random number to the data management device; receive the data management from the terminal The first verification value and the second verification value of the device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and the third random number It is determined that the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number.
  • the transceiver unit 1010 is further configured to: receive a third verification value from the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and The terminal's own registered password is determined.
  • the processing unit 1020 is further configured to: if the first verification value is equal to the third verification value, the authentication server determines that the terminal is legal; if the first verification value is not equal to the third verification value And the authentication server determines that the terminal is illegal.
  • the apparatus 1000 herein is embodied in the form of a functional unit.
  • the term "unit” as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality.
  • ASIC application specific integrated circuit
  • the device 1000 may be specifically an authentication server in the foregoing method embodiment, and the device 1000 may be used to execute various processes and/or steps corresponding to the authentication server in the foregoing method embodiment. To avoid repetition, we will not repeat them here.
  • FIG. 12 shows a communication system 1100 provided by an embodiment of the present application.
  • the system 1100 includes: a device 800 and a device 900.
  • the device 800 is completely corresponding to the authentication server in the method embodiment, and the device 900 completely corresponds to the terminal in the method embodiment.
  • the device 1000 completely corresponds to the data management device in the method embodiment, and the corresponding unit performs the corresponding steps.
  • the transceiver unit method performs the transceiving step in the method embodiment, and the steps other than transceiving may be performed by the processing module.
  • the processing module For the function of the specific module, reference may be made to the corresponding method embodiment, which is not described in detail.
  • the authentication server, the terminal, and the data management device of the foregoing solutions have the functions of implementing the corresponding steps performed by the authentication server, the terminal, and the data management device in the foregoing method; the functions may be implemented by hardware or by executing corresponding software through hardware.
  • the hardware or software includes one or more modules corresponding to the above functions; for example, the transmitting unit may be replaced by a transmitter, the receiving unit may be replaced by a receiver, and other units such as a determining unit may be replaced by a processor and executed separately Transceiver operations and associated processing operations in various method embodiments.
  • the device in FIG. 9-11 may also be a chip or a chip system, for example, a system on chip (SoC).
  • the receiving unit and the sending unit may be transceiver circuits of the chip, which are not limited herein.
  • FIG. 13 shows still another communication device 1200 provided by an embodiment of the present application.
  • the apparatus 1200 includes a processor 1210, a transceiver 1220, and a memory 1230.
  • the processor 1210, the transceiver 1220, and the memory 1230 communicate with each other through an internal connection path.
  • the memory 1230 is configured to store instructions, and the processor 1210 is configured to execute instructions stored by the memory 1230 to control the transceiver 1220 to send signals and / or receive signals.
  • the transceiver 1220 is configured to receive the encrypted first random number from the terminal, and the processor 1210 is configured to determine, according to the encrypted first random number, the second random number, and the third random number, an anchor key. The transceiver 1220 is further configured to send the anchor key to the mobility management device.
  • the memory 1230 can be a device other than the communication device 1200.
  • the device 1200 may be specifically an authentication server in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the terminal in the foregoing method embodiment.
  • the memory 1230 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory.
  • the memory can also store information of the device type.
  • the processor 1210 can be configured to execute instructions stored in a memory, and when the processor 1210 executes instructions stored in the memory, the processor 1110 is configured to perform the various steps of the method embodiment corresponding to the authentication server described above and/or Or process.
  • FIG. 14 shows still another communication device 1300 provided by an embodiment of the present application.
  • the apparatus 1300 includes a processor 1310, a transceiver 1320, and a memory 1330.
  • the processor 1310, the transceiver 1320, and the memory 1330 communicate with each other through an internal connection path.
  • the memory 1330 is configured to store instructions, and the processor 1310 is configured to execute instructions stored by the memory 1330 to control the transceiver 1320 to send signals and / or receive signals.
  • the processor 1310 is configured to generate a first random number, and determine an anchor key according to the first random number, the second random number, and the third random number, where the anchor key is used for the terminal communication.
  • the memory 1330 can be a device other than the communication device 1300.
  • the device 1300 may be specifically the terminal in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the terminal in the foregoing method embodiment.
  • the memory 1330 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory.
  • the memory can also store information of the device type.
  • the processor 1310 can be configured to execute instructions stored in a memory, and when the processor 1310 executes instructions stored in the memory, the processor 1310 is configured to perform the various steps of the method embodiments corresponding to the terminal described above and/or Process.
  • FIG. 15 shows still another communication device 1400 provided by an embodiment of the present application.
  • the apparatus 1400 includes a processor 1410, a transceiver 1420, and a memory 1430.
  • the processor 1410, the transceiver 1420, and the memory 1330 communicate with each other through an internal connection path.
  • the memory 1430 is configured to store instructions, and the processor 1410 is configured to execute instructions stored by the memory 1430 to control the transceiver 1420 to send signals and / or receive signals.
  • the transceiver 1420 is configured to obtain a first verification value and a second verification value from the data management device.
  • the processor 1410 is configured to authenticate the terminal according to the first verification value.
  • the transceiver 1320 is further configured to When the result of the terminal authentication is legal, the second verification value is sent to the terminal.
  • the memory 1430 can be a device other than the communication device 1400.
  • the device 1400 may be specifically the data management device in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the data management device in the foregoing method embodiment.
  • the memory 1430 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory.
  • the memory can also store information of the device type.
  • the processor 1410 can be configured to execute instructions stored in a memory, and when the processor 1310 executes instructions stored in the memory, the processor 1410 is configured to perform the various steps of the method embodiment corresponding to the data management device described above and / or process.
  • the transceiver described above can include a transmitter and a receiver.
  • the transceiver may further include an antenna, and the number of antennas may be one or more.
  • the memory can be a separate device or integrated into the processor.
  • the above various devices or parts of the device can be integrated into the chip for implementation, such as integration into a baseband chip.
  • the transceiver in FIG. 13 to FIG. 15 may also be a communication interface, which is not limited herein.
  • the processor of the foregoing device may be a central processing unit (CPU), and the processor may also be another general-purpose processor, a digital signal processor (DSP). ), application specific integrated circuit (ASIC), field-programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software units in the processor.
  • the software unit can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in a memory, and the processor executes instructions in the memory, in combination with hardware to perform the steps of the above method. To avoid repetition, it will not be described in detail here.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the available media can be magnetic media (eg, a floppy disk, a hard disk, Magnetic tape), optical medium (for example, DVD), or semiconductor medium (such as solid state disk (SSD)).
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a communication method and a communication apparatus for improving the security of transmission. The method comprises: an authentication server receiving an encrypted first random number from a terminal; the authentication server determining an anchor key according to the encrypted first random number, a second random number and a third random number; and the authentication server sending the anchor key to a mobility management device.

Description

通信方法和通信装置Communication method and communication device 技术领域Technical field

本申请涉及通信领域,并且更具体地,涉及通信领域中的通信方法和通信装置。The present application relates to the field of communications and, more particularly, to communication methods and communication devices in the field of communications.

背景技术Background technique

在未来的网络系统中,使用可扩展认证协议(extensible authentication protocol,EAP)进行鉴权,具体地,认证服务器根据保存的终端的注册密码生成哈希值,终端根据自身保存的注册密码生成哈希值,若认证服务器生成的哈希值与终端生成的哈希值一致,则认为鉴权通过,当鉴权通过时,可以利用鉴权时采用的终端的注册密码确定锚点密钥,然后利用锚点密钥进行通信,但是,若终端的注册密码被破解,这样,导致攻击者很容易得到锚点密钥,这样终端的通信内容容易泄露,无法保证传输的安全性。In a future network system, an extensible authentication protocol (EAP) is used for authentication. Specifically, the authentication server generates a hash value according to the stored password of the saved terminal, and the terminal generates a hash according to the saved password stored by the terminal. If the hash value generated by the authentication server is consistent with the hash value generated by the terminal, the authentication is considered to be passed. When the authentication is passed, the anchor key of the terminal used in the authentication may be used to determine the anchor key, and then the anchor is used. The key is used for communication. However, if the registration password of the terminal is cracked, the attacker can easily obtain the anchor key, so that the communication content of the terminal is easily leaked, and the security of the transmission cannot be guaranteed.

发明内容Summary of the invention

本申请提供一种通信方法和装置,有助于提高传输的安全性。The present application provides a communication method and apparatus to help improve the security of transmission.

第一方面,提供了一种通信方法,包括:认证服务器接收来自终端的加密后的第一随机数;所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥;所述认证服务器向移动性管理设备发送所述锚点密钥。In a first aspect, a communication method is provided, comprising: an authentication server receiving an encrypted first random number from a terminal; the authentication server according to the encrypted first random number, second random number, and third random number And determining an anchor key; the authentication server transmitting the anchor key to the mobility management device.

因此,在本申请实施例中,利用第一随机数取代终端的注册密码来确定锚点密钥,由于随机数具有随机性,并且可以经常变更,例如可以由终端在每次会话建立时生成,避免了长期采用固定的终端的注册密码的而造成的安全性问题。Therefore, in the embodiment of the present application, the first random number is used to replace the registration password of the terminal to determine the anchor key. Since the random number has randomness and can be changed frequently, for example, it can be generated by the terminal every time the session is established. The security problem caused by the long-term use of the registered password of the fixed terminal is avoided.

作为一个可选实施例,所述锚点密钥用于所述移动性管理设备进行通信。As an alternative embodiment, the anchor key is used by the mobility management device to communicate.

具体来说,移动性管理设备可以根据所述锚点密钥与终端进行通信,或者移动性管理设备将锚点密钥发送给接入网设备,接入网设备根据所述锚点密钥与终端进行通信。进一步地,例如,所述移动性管理设备可以利用所述锚点密钥生成下层密钥,例如,所述移动性管理设备与终端利用所述下层密钥进行通信,或者所述移动性管理设备将所述下层密钥发送给接入网设备,所述接入网设备与所述终端利用所述下层密钥进行通信。又例如,所述移动性管理设备将所述锚点密钥发送给接入网设备,接入网设备根据所述锚点密钥生成下层密钥,所述接入网设备与所述终端利用下层密钥进行通信。Specifically, the mobility management device may communicate with the terminal according to the anchor key, or the mobility management device sends the anchor key to the access network device, and the access network device according to the anchor key The terminal communicates. Further, for example, the mobility management device may generate a lower layer key by using the anchor key, for example, the mobility management device communicates with the terminal using the lower layer key, or the mobility management device And transmitting the lower layer key to the access network device, where the access network device communicates with the terminal by using the lower layer key. For another example, the mobility management device sends the anchor key to an access network device, and the access network device generates a lower layer key according to the anchor key, where the access network device uses the terminal and the terminal The lower layer key communicates.

可选的,认证服务器可以根据锚点密钥可以生成一个或多个下层密钥,下层密钥可以用于控制面数据的通信也可以用于用户面数据的通信,举例来说,下层密钥可以用于终端与移动性管理设备之间的控制面数据通信和/或用户面数据的通信,下层密钥可以用于终端与接入网设备之间的控制面数据通信和/或用于面数据通信。并且,终端与移动性管理设备之间的下层密钥可以与终端与接入网设备之间的下层密钥可以不同。可选的,终端与移动性管理设备之间的控制面数据通信所采用的下层密钥可以与用户面数据所采用的下层密钥相同或不同。可选的,终端与接入网设备之间的控制面数据所采用的下层密钥可以 与用户面数据所采用的下层密钥相同或不同,本申请实施例对此不作限制。Optionally, the authentication server may generate one or more lower layer keys according to the anchor key, and the lower layer key may be used for communication of control plane data or for communication of user plane data, for example, a lower layer key. It can be used for communication between control data communication and/or user plane data between the terminal and the mobility management device. The lower layer key can be used for control plane data communication between the terminal and the access network device and/or for surface communication. data communication. Moreover, the lower layer key between the terminal and the mobility management device may be different from the lower layer key between the terminal and the access network device. Optionally, the lower layer key used by the control plane data communication between the terminal and the mobility management device may be the same as or different from the lower layer key used by the user plane data. Optionally, the lower layer key used by the control plane data between the terminal and the access network device may be the same as or different from the lower layer key used by the user plane data, which is not limited in this embodiment.

在某些实现方式中,所述第二随机数由终端生成,所述第三随机数由所述认证服务器生成或者由所述移动性管理设备生成或者由数据管理设备生成。In some implementations, the second random number is generated by a terminal generated by the authentication server or generated by the mobility management device or by a data management device.

可选的,所述方法还包括:认证服务器接收终端发送的第二随机数,若第三随机数由移动性管理设备生成,则认证服务器接收移动性管理设备发送的第三随机数;若第三随机数由数据管理设备生成,则认证服务器接收数据管理设备发送的第三随机数。Optionally, the method further includes: the authentication server receives the second random number sent by the terminal, and if the third random number is generated by the mobility management device, the authentication server receives the third random number sent by the mobility management device; The three random numbers are generated by the data management device, and the authentication server receives the third random number sent by the data management device.

这样,认证服务器就可以根据终端生成的第二随机数、网络侧设备生成的第三随机数以及终端发送的加密后的第一随机数确定锚点密钥,利用随机数的随机性,能够提高确定的锚点密钥的安全性。In this way, the authentication server can determine the anchor key according to the second random number generated by the terminal, the third random number generated by the network side device, and the encrypted first random number sent by the terminal, and can improve the randomness of the random number. Determine the security of the anchor key.

在某些实现方式中,所述认证服务器从数据管理设备获取第一验证值和第二验证值;所述认证服务器根据所述第一验证值对所述终端进行认证;所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值,这样终端就可以根据第二验证值对所述认证服务器进行认证。可选的,在所述根据所述加密后的第一随机数确定锚点密钥之前,所述认证服务器从数据管理设备获取第一验证值和第二验证值;所述认证服务器根据所述第一验证值对所述终端进行认证。In some implementations, the authentication server acquires a first verification value and a second verification value from a data management device; the authentication server authenticates the terminal according to the first verification value; If the result of the terminal authentication is legal, the second verification value is sent to the terminal, so that the terminal can authenticate the authentication server according to the second verification value. Optionally, before the determining the anchor key according to the encrypted first random number, the authentication server acquires a first verification value and a second verification value from the data management device; the authentication server is configured according to the The first verification value authenticates the terminal.

在某些实现方式中,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体包括:所述认证服务器向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定;所述认证服务器接收来自所述数据管理设备的所述第一验证值和所述第二验证值。验证值由数据管理设备生成,并传递给认证服务器,相比于现有技术中由认证服务器生成验证值时需要从数据管理设备获取用户注册密码,避免了用户敏感信息在网络中传输,提高了系统的安全性。In some implementations, the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number; The second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number; the authentication server receives the first verification value from the data management device and The second verification value. The verification value is generated by the data management device and is transmitted to the authentication server. When the authentication value is generated by the authentication server in the prior art, the user registration password needs to be obtained from the data management device, thereby preventing the user sensitive information from being transmitted in the network, thereby improving the System security.

在某些实现方式中,所述方法还包括:所述认证服务器接收所述终端发送的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;其中,所述认证服务器根据所述第一验证值对所述终端进行认证,包括:若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法。可选的,若所述第一验证值不等于所述第三验证值,则所述认证服务器确定所述终端不合法。In some implementations, the method further includes: the authentication server receiving a third verification value sent by the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and Determining, by the authentication server, the authentication password of the terminal, wherein the authentication server authenticates the terminal according to the first verification value, if the first verification value is equal to the third verification value, The authentication server determines that the terminal is legitimate. Optionally, if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid.

可选的,所述第一验证值和所述第三验证值采用相同的认证方法计算得到,例如,可以采用预设的认证方法得到,或者采用由终端和认证服务器协商确定的认证方法得到。Optionally, the first verification value and the third verification value are calculated by using the same authentication method, for example, by using a preset authentication method, or by using an authentication method determined by the terminal and the authentication server.

可选的,所述第一验证和所述第三验证值可以是采用哈希算法得到的。Optionally, the first verification and the third verification value may be obtained by using a hash algorithm.

在某些实现方式中,在所述认证服务器从数据管理设备获取第一验证值和第二验证值之前,所述方法还包括:所述认证服务器接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法;所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法。可选的,所述认证服务器从数据管理设备获取第一验证值和第二验证值,包括:所述认证服务器从所述数据管理设备获取根据所述第一认证方法确定的所述第一验证值和所述第二验证值。在终端发给认证服务器的N2消息中,可增加终端支持的认证方法,以便认证服务器一次就能选择出需要使用的认证方法,避免了多次协商导致的认证时延大的问 题。In some implementations, before the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, the method further includes: the authentication server receiving one of the terminal support from the terminal Or two or more authentication methods; the authentication server determines, according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, The first method of authentication. Optionally, the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, including: the authentication server acquiring, by the data management device, the first verification determined according to the first authentication method a value and the second verification value. In the N2 message sent by the terminal to the authentication server, the authentication method supported by the terminal can be added, so that the authentication server can select the authentication method to be used at one time, and avoid the problem of large authentication delay caused by multiple negotiation.

在某些实现方式中,所述认证服务器接收所述终端发送的所述终端支持的一种或者两种及以上的认证方法,包括:所述认证服务器接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每种认证方法的优先级;其中,所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法,包括:所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法中每种认证方法的优先级以及所述认证服务器支持的认证方法,确定所述第一认证方法。在终端发给认证服务器的N2消息中,可增加终端支持的认证方法以及相应的优先级信息,其中,优先级信息可以用于指示终端期望使用的认证方法,以便认证服务器一次就能选择出需要使用的认证方法,避免了多次协商导致的认证时延大的问题。In some implementations, the authentication server receives one or two or more authentication methods supported by the terminal by the terminal, including: the authentication server receives the terminal support from the terminal. One or two or more authentication methods and a priority of each of the one or two or more authentication methods; wherein the authentication server is based on one or both of the terminal support The above authentication method and the authentication method supported by the authentication server determine a first authentication method used for performing authentication on the terminal, including: the authentication server is based on one or two or more types of authentication supported by the terminal The first authentication method is determined by a priority of each authentication method in the method and an authentication method supported by the authentication server. In the N2 message sent by the terminal to the authentication server, the authentication method supported by the terminal and the corresponding priority information may be added, wherein the priority information may be used to indicate an authentication method that the terminal desires to use, so that the authentication server can select the need at a time. The authentication method used avoids the problem of large authentication delay caused by multiple negotiation.

可选的,所述终端在向认证服务器发送的注册消息中携带所述终端支持的一种或两种以上的认证方法,所述认证服务器接收所述终端发送的注册消息,在注册消息中获取所述终端支持的一种或两种以上的认证方法。例如,认证服务器可以在终端支持的一种或两种以上的认证方法和认证服务器自身支持的种认证方法中取交集,若交集中只包括一个元素,即一个认证方法,则该认证方法为第一认证方法,若交集中包括了两个以上的元素,即两个以上的认证方法,则认证方法可以为这两个以上认证方法中的任意一个。或者,认证服务器根据终端支持的一种或两种以上的认证方法中每种认证方法的优先级在这两种以上认证方法中确定对终端进行认证所采用的第一认证方法。Optionally, the terminal carries one or two or more authentication methods supported by the terminal in the registration message sent by the terminal, where the authentication server receives the registration message sent by the terminal, and obtains the registration message in the registration message. One or more authentication methods supported by the terminal. For example, the authentication server may take an intersection in one or more authentication methods supported by the terminal and an authentication method supported by the authentication server itself. If the intersection includes only one element, that is, an authentication method, the authentication method is In an authentication method, if the intersection includes more than two elements, that is, two or more authentication methods, the authentication method may be any one of the two or more authentication methods. Alternatively, the authentication server determines the first authentication method used for authenticating the terminal among the two or more authentication methods according to the priority of each of the one or more authentication methods supported by the terminal.

在某些实现方式中,所述加密后的第一随机数是利用第一密钥加密第一随机数得到的;所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥,包括:所述认证服务器利用第二密钥对所述加密后的第一随机数进行解密,得到所述第一随机数,其中,所述第二密钥为与所述第一密钥对应的密钥;所述认证服务器利用所述第一随机数、第二随机数和第三随机数,确定所述锚点密钥。In some implementations, the encrypted first random number is obtained by encrypting the first random number with the first key; the authentication server is configured according to the encrypted first random number, the second random number, and And determining, by the third random number, the anchor key, comprising: the authentication server decrypting the encrypted first random number by using the second key, to obtain the first random number, wherein the second secret The key is a key corresponding to the first key; the authentication server determines the anchor key by using the first random number, the second random number, and the third random number.

可选的,认证服务器可以保存多个终端的解密的密钥,当认证服务器接收到终端发送的加密后的第一随机数之后,认证服务器可以根据终端的标识在自身保存的多个密钥中确定对加密后的第一随机数进行解密的第二密钥,即该第二密钥即为第一密钥对应的密钥。Optionally, the authentication server may save the decrypted keys of the multiple terminals. After the authentication server receives the encrypted first random number sent by the terminal, the authentication server may be in the multiple keys saved by the terminal according to the identifier of the terminal. Determining a second key for decrypting the encrypted first random number, that is, the second key is a key corresponding to the first key.

可选的,所述第一密钥和所述第二密钥可以为一对非对称密钥,所述第一密钥为公钥,所述第二密钥为私钥。Optionally, the first key and the second key may be a pair of asymmetric keys, the first key is a public key, and the second key is a private key.

可选的,所述第一密钥和所述第二密钥为一对对称密钥,即第一密钥和第二密钥相同。Optionally, the first key and the second key are a pair of symmetric keys, that is, the first key and the second key are the same.

在某些实现方式中,所述第一密钥和所述第二密钥为根据迪菲-赫尔曼DH算法生成的一对密钥。In some implementations, the first key and the second key are a pair of keys generated according to a Diffie-Hellman DH algorithm.

第二方面,提供了一种通信方法,包括:终端生成第一随机数;所述终端根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。在本申请中,终端采用随机数代替现有技术中的注册密码生成锚点密钥,有效的提高了确定锚点密钥的安全性。A second aspect provides a communication method, including: a terminal generating a first random number; and determining, by the terminal, an anchor key according to the first random number, the second random number, and a third random number, the anchor A point key is used for the terminal communication. In the present application, the terminal uses a random number instead of the registration password in the prior art to generate an anchor key, which effectively improves the security of determining the anchor key.

可选的,所述锚点密钥用于所述终端通信,可以是:所述终端可以根据所述锚点密钥与移动性管理设备进行通信,或者所述终端可以根据所述锚点密钥与接入网设备进行通信。可选的,锚点密钥可以是用于传输控制面数据的密钥,也可以是用于传输用户面数据 的密钥;可选的,可以根据锚点密钥生成下层密钥,下层密钥可以用于传输控制面数据或用户面数据。Optionally, the anchor key is used for communication by the terminal, and the terminal may communicate with the mobility management device according to the anchor key, or the terminal may be dense according to the anchor point. The key communicates with the access network device. Optionally, the anchor key may be a key used to transmit control plane data, or may be a key used to transmit user plane data; optionally, a lower layer key may be generated according to the anchor key, and the lower layer is dense. The key can be used to transfer control plane data or user plane data.

在某些实现方式中,所述方法还包括:所述终端对所述第一随机数进行加密,得到加密后的第一随机数;所述终端向认证服务器发送所述加密后的第一随机数。In some implementations, the method further includes: the terminal encrypting the first random number to obtain an encrypted first random number; and the terminal sending the encrypted first random to an authentication server number.

在某些实现方式中,所述第二随机数由终端生成,所述第三随机数由所述认证服务器或移动性管理设备或者数据管理设备生成。In some implementations, the second random number is generated by a terminal, and the third random number is generated by the authentication server or a mobility management device or a data management device.

可选的,所述方法还包括:终端接收所述认证服务器发送的第三随机数。Optionally, the method further includes: receiving, by the terminal, a third random number sent by the authentication server.

在某些实现方式中,所述终端接收所述数据管理设备通过所述认证服务器发送的第二验证值,所述第二验证值由所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第二随机数确定的;所述终端根据所述终端标识、所述终端保存的自身的注册密码以及所述第二随机数确定第四验证值;所述终端根据所述第二验证值和所述第四验证值对认证服务器进行认证。具体来说,若所述第二验证值与所述第四验证值相同,终端确定所述认证服务器合法,若所述第二验证值与所述第四验证值不相同,终端确定所述认证服务器不合法。In some implementations, the terminal receives a second verification value sent by the data management device by using the authentication server, where the second verification value is determined by a terminal identifier of the terminal and saved by the data management device. Determining, by the terminal, the registration password of the terminal and the second random number; the terminal determining a fourth verification value according to the terminal identifier, the registration password saved by the terminal, and the second random number; The second verification value and the fourth verification value authenticate the authentication server. Specifically, if the second verification value is the same as the fourth verification value, the terminal determines that the authentication server is legal. If the second verification value is different from the fourth verification value, the terminal determines the authentication. The server is not legal.

可选的,所述第二验证值和所述第四验证值采用相同的认证方法计算得到,例如,可以采用预设的认证方法得到,或者采用终端和认证服务器协商确定的认证方法得到。Optionally, the second verification value and the fourth verification value are calculated by using the same authentication method, for example, by using a preset authentication method, or by using an authentication method determined by the terminal and the authentication server.

可选的,所述第二验证和所述第四验证值可以是使用哈希算法生成的。Optionally, the second verification and the fourth verification value may be generated by using a hash algorithm.

在某些实现方式中,所述方法还包括:所述终端向所述认证服务器发送所述终端支持的认证方法,终端支持的认证方法可能包括一个、两个或者两个以上。In some implementations, the method further includes: the terminal sending the authentication method supported by the terminal to the authentication server, where the authentication method supported by the terminal may include one, two, or two.

在某些实现方式中,所述终端向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法,包括:所述终端向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每个认证方法的优先级。通过对不同认证方法的设置不同的优先级,可以指示认证服务器根据终端的指示一次性选择终端期望的认证方法。In some implementations, the terminal sends one or two or more authentication methods supported by the terminal to the authentication server, where the terminal sends the terminal to the authentication server to send the terminal supported by the terminal. Or two or more authentication methods and the priority of each of the one or two or more authentication methods. By setting different priorities for different authentication methods, the authentication server may be instructed to select the authentication method desired by the terminal at one time according to the instruction of the terminal.

第三方面,提供了一种通信方法,包括:数据管理设备接收认证服务器发送的终端的终端标识、第二随机数和第三随机数;所述数据管理设备根据所述终端标识、所述第二随机数和所述第三随机数确定第一验证值和第二验证值;所述数据管理设备向所述认证服务器发送所述第一验证值和所述第二验证值,以便于所述认证服务器和所述终端利用所述第一验证值和所述第二验证值进行互相认证。A third aspect provides a communication method, including: receiving, by a data management device, a terminal identifier, a second random number, and a third random number of a terminal sent by an authentication server; and the data management device according to the terminal identifier, the Determining, by the second random number and the third random number, a first verification value and a second verification value; the data management device transmitting the first verification value and the second verification value to the authentication server, to facilitate the The authentication server and the terminal perform mutual authentication using the first verification value and the second verification value.

在某些实现方式中,所述数据管理设备根据所述终端标识、所述第二随机数和所述第三随机数确定第一验证值和第二验证值,包括:所述数据管理设备根据所述终端标识、所述数据管理设备保存的所述终端的注册密码、所述第二随机数确定所述第二验证值;所述数据管理设备根据所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定所述第一验证值。In some implementations, the data management device determines the first verification value and the second verification value according to the terminal identifier, the second random number, and the third random number, including: the data management device is configured according to The terminal identifier, the registration password of the terminal saved by the data management device, and the second random number determine the second verification value; the data management device saves according to the terminal identifier and the data management device The registration password of the terminal and the third random number determine the first verification value.

可选的,所述方法还包括:所述数据管理设备接收所述认证服务器发送的第一认证方法的标识,所述数据管理设备根据所述第一认证方法的标识确定计算第一验证值和第二验证值采用的第一认证方法,所述数据管理设备利用所述第一认证方法计算所述第一验证值和所述第二验证值。Optionally, the method further includes: the data management device receives an identifier of the first authentication method sent by the authentication server, and the data management device determines, according to the identifier of the first authentication method, a first verification value and The first authentication method adopted by the second verification value, the data management device calculates the first verification value and the second verification value by using the first authentication method.

第四方面,提供了一种通信方法,包括:认证服务器从数据管理设备获取第一验证值 和第二验证值;所述认证服务器根据所述第一验证值对所述终端进行认证;所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。A fourth aspect provides a communication method, including: an authentication server acquiring a first verification value and a second verification value from a data management device; the authentication server authenticating the terminal according to the first verification value; The authentication server sends the second verification value to the terminal if the result of authenticating the terminal is legal.

在某些实现方式中,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体包括:所述认证服务器向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定;所述认证服务器接收来自所述数据管理设备的所述第一验证值和所述第二验证值。In some implementations, the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number; The second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number; the authentication server receives the first verification value from the data management device and The second verification value.

在某些实现方式中,所述方法还包括:所述认证服务器接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;其中,所述认证服务器根据所述第一验证值对所述终端进行认证,包括:若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法;若所述第一验证值不等于所述第三验证值,则所述认证服务器确定所述终端不合法。In some implementations, the method further includes: the authentication server receiving a third verification value from the terminal, the third verification value by the third random number, a terminal identifier of the terminal, and Determining, by the authentication server, the authentication password of the terminal, wherein the authentication server authenticates the terminal according to the first verification value, if the first verification value is equal to the third verification value, The authentication server determines that the terminal is legal; if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid.

第五方面,提供了一种通信方法,包括:终端生成第一随机数;所述终端根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥;所述终端对所述第一随机数进行加密,得到加密后的第一随机数;所述终端向认证服务器发送所述加密后的第一随机数;所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥。A fifth aspect provides a communication method, including: a terminal generating a first random number; and determining, by the terminal, an anchor key according to the first random number, the second random number, and a third random number; Encrypting the first random number to obtain an encrypted first random number; the terminal transmitting the encrypted first random number to an authentication server; and the authentication server is configured according to the encrypted first random number The second random number and the third random number determine the anchor key.

在某些实现方式中,所述第二随机数由所述终端生成,所述第三随机数由所述认证服务器生成或者由所述移动性管理设备生成或者由数据管理设备生成。In some implementations, the second random number is generated by the terminal, and the third random number is generated by the authentication server or generated by the mobility management device or by a data management device.

在某些实现方式中,所述方法还包括:所述认证服务器接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;所述认证服务器从数据管理设备获取第一验证值和第二验证值;所述认证服务器根据所述第一验证值和所述第三验证值对所述终端进行认证;所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值;所述终端根据所述终端标识、所述终端保存的自身的注册密码以及所述第二随机数确定第四验证值;所述终端根据所述第二验证值和所述第四验证值对认证服务器进行认证。In some implementations, the method further includes: the authentication server receiving a third verification value from the terminal, the third verification value by the third random number, a terminal identifier of the terminal, and Determining, by the terminal, the registration password saved by the terminal; the authentication server acquiring the first verification value and the second verification value from the data management device; the authentication server is configured according to the first verification value and the third verification value The terminal performs authentication; the authentication server sends the second verification value to the terminal when the result of authenticating the terminal is legal; the terminal saves itself according to the terminal identifier and the terminal The registration password and the second random number determine a fourth verification value; the terminal authenticates the authentication server according to the second verification value and the fourth verification value.

在某些实现方式中,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体包括:所述认证服务器向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定;所述认证服务器接收来自所述数据管理设备的所述第一验证值和所述第二验证值。In some implementations, the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, specifically: sending, by the authentication server, the terminal identifier of the terminal to the data management device, a second random number and the third random number, wherein the first verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number; The second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number; the authentication server receives the first verification value from the data management device and The second verification value.

第六方面,提供了一种通信装置,用于执行上述第一方面或第一方面的任一可能的实现方式中的方法。具体地,该装置包括用于执行上述第一方面或第一方面的任一可能的实现方式中的方法的单元。In a sixth aspect, a communication apparatus is provided for performing the method of any of the first aspect or the first aspect of the first aspect. In particular, the apparatus comprises means for performing the method of any of the first aspect or the first aspect of the first aspect described above.

第七方面,提供了一种通信装置,用于执行上述第二方面或第二方面的任一可能的实现方式中的方法。具体地,该装置包括用于执行上述第二方面或第二方面的任一可能的实现方式中的方法的单元。In a seventh aspect, a communication apparatus is provided for performing the method of any of the possible implementations of the second aspect or the second aspect. In particular, the apparatus comprises means for performing the method of any of the possible implementations of the second aspect or the second aspect described above.

第八方面,提供了一种通信装置,用于执行上述第三方面或第三方面的任一可能的实 现方式中的方法。具体地,该装置包括用于执行上述第三方面或第三方面的任一可能的实现方式中的方法的单元。In an eighth aspect, there is provided a communication apparatus for performing the method of any of the possible implementations of the third aspect or the third aspect described above. In particular, the apparatus comprises means for performing the method of any of the possible implementations of the third aspect or the third aspect described above.

第九方面,提供了一种通信装置,用于执行上述第四方面或第四方面的任一可能的实现方式中的方法。具体地,该装置包括用于执行上述第四方面或第四方面的任一可能的实现方式中的方法的单元。According to a ninth aspect, there is provided a communication apparatus for performing the method of any of the above-described fourth or fourth possible implementations. In particular, the apparatus comprises means for performing the method of any of the above-described fourth or fourth aspects of the fourth aspect.

第十方面,提供了一种通信装置,该装置包括:收发器(可以包括发送器和接收器)、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制接收器接收信号,并控制发送器发送信号,使得该装置执行第一方面或第一方面的任一种可能的实现方式中的方法。In a tenth aspect, a communication device is provided, the device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals The apparatus is caused to perform the method of the first aspect or any of the possible implementations of the first aspect.

可选的,该存储器可以为该通信装置之外的设备。Optionally, the memory may be a device other than the communication device.

第十一方面,提供了一种通信装置,该装置包括:收发器(可以包括发送器和接收器)、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制接收器接收信号,并控制发送器发送信号,使得该装置执行第二方面或第二方面的任一种可能的实现方式中的方法。In an eleventh aspect, a communication device is provided, the device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals The apparatus is caused to perform the method of any of the possible implementations of the second aspect or the second aspect.

可选的,该存储器可以为该通信装置之外的设备。Optionally, the memory may be a device other than the communication device.

可选的,所述通信装置包括终端或终端内的芯片。Optionally, the communication device comprises a chip in a terminal or a terminal.

第十二方面,提供了一种通信装置,该装置包括:收发器(可以包括发送器和接收器)、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制接收器接收信号,并控制发送器发送信号,使得该装置执行第三方面或第三方面的任一种可能的实现方式中的方法。In a twelfth aspect, a communication device is provided, the device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals The apparatus is caused to perform the method of any of the possible implementations of the third aspect or the third aspect.

可选的,该存储器可以为该通信装置之外的设备。Optionally, the memory may be a device other than the communication device.

第十三方面,提供了一种通信装置,该装置包括:收发器(可以包括发送器和接收器)、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制接收器接收信号,并控制发送器发送信号,使得该装置执行第四方面或第四方面的任一种可能的实现方式中的方法。In a thirteenth aspect, a communication device is provided, the device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals The apparatus is caused to perform the method of any of the possible implementations of the fourth aspect or the fourth aspect.

可选的,该存储器可以为该通信装置之外的设备。Optionally, the memory may be a device other than the communication device.

第十四方面,提供了一种通信装置,该装置包括:收发器(可以包括发送器和接收器)、存储器和处理器。其中,该收发器、该存储器和该处理器通过内部连接通路互相通信,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,以控制接收器接收信号,并控制发送器发送信号,使得该装置执行第五方面或第五方面的任一种可能的实现方式中的方法。In a fourteenth aspect, a communication device is provided, the device comprising: a transceiver (which may include a transmitter and a receiver), a memory, and a processor. Wherein the transceiver, the memory and the processor are in communication with each other via an internal connection path for storing instructions for executing instructions stored in the memory to control the receiver to receive signals and to control the transmitter to transmit signals The apparatus is caused to perform the method of any of the possible implementations of the fifth aspect or the fifth aspect.

可选的,该存储器可以为该通信装置之外的设备。Optionally, the memory may be a device other than the communication device.

第十五方面,提供了一种通信系统,包括第六方面或其任一种可选实现方式中的装置和第七方面或其任一种可选实现方式中的装置,可选的,还包括第八方面或其任一种可选实现方式中的装置。或者所述系统包括第八方面或其任一种可选实现方式中的装置和第九 方面或其任一种可选实现方式中的装置。或者,所述系统包括第十方面或其任一种可选实现方式中的装置和第十一方面或其任一种可选实现方式中的装置,可选的,还包括第十二方面或其任一种可选实现方式中的装置。或者,所述系统包括第十二方面或其任一种可选实现方式中的装置和第十三方面或其任一种可选实现方式中的装置。A fifteenth aspect, a communication system comprising the apparatus of the sixth aspect or any alternative implementation thereof, and the apparatus of the seventh aspect or any alternative implementation thereof, optionally, further An apparatus in an eighth aspect, or any alternative implementation thereof. Or the system comprises the apparatus of the eighth aspect or any alternative implementation thereof and the apparatus of the ninth aspect or any alternative implementation thereof. Alternatively, the system includes the apparatus of the tenth aspect or any alternative implementation thereof, and the apparatus of the eleventh aspect or any alternative implementation thereof, optionally, further comprising the twelfth aspect or A device in any of the alternative implementations. Alternatively, the system comprises the apparatus of the twelfth aspect or any alternative implementation thereof and the apparatus of the thirteenth aspect or any alternative implementation thereof.

第十六方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如第一方面或第一方面的任一可能的实现方式中的方法。In a sixteenth aspect, a computer readable storage medium is provided, the instructions being stored in a computer readable storage medium, when executed on a computer, causing the computer to perform any of the first aspect or the first aspect The method in the implementation.

第十七方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如第二方面或第二方面的任一可能的实现方式中的方法。In a seventeenth aspect, a computer readable storage medium is provided, the instructions being stored in the computer readable storage medium, when executed on a computer, causing the computer to perform any of the possible aspects of the second aspect or the second aspect The method in the implementation.

第十八方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如第三方面或第三方面的任一可能的实现方式中的方法。In an eighteenth aspect, a computer readable storage medium is provided, wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the third or third aspects The method in the implementation.

第十九方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如第四方面或第四方面的任一可能的实现方式中的方法。In a nineteenth aspect, a computer readable storage medium is provided, wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the fourth or fourth aspects The method in the implementation.

第二十方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如第五方面或第五方面的任一可能的实现方式中的方法。In a twentieth aspect, a computer readable storage medium is provided, wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform any of the fifth or fifth aspects The method in the implementation.

第二十一方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任一可能的实现方式中的方法。In a twenty-first aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the first aspect or the first aspect of the first aspect.

第二十二方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面或第二方面的任一可能的实现方式中的方法。In a twenty-second aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described second or second aspect.

第二十三方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第三方面或第三方面的任一可能的实现方式中的方法。In a twenty-third aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described third or third aspect.

第二十四方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第四方面或第四方面的任一可能的实现方式中的方法。In a twenty-fourth aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above-described fourth or fourth aspects.

第二十五方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第五方面或第五方面的任一可能的实现方式中的方法。In a twenty-fifth aspect, the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of the above fifth or fifth possible implementations.

第二十六方面,本申请提供了一种通信芯片,其中存储有指令,当其在认证服务器或终端或数据管理设备上运行时,使得认证服务器或终端或数据管理设备执行上述各方面所述的任一方法。In a twenty-sixth aspect, the present application provides a communication chip in which an instruction is stored, when it is run on an authentication server or a terminal or a data management device, causing an authentication server or terminal or data management device to perform the above aspects Any method.

附图说明DRAWINGS

图1示出了本申请实施例提供的系统架构图。FIG. 1 is a system architecture diagram provided by an embodiment of the present application.

图2示出了本申请实施例提供的应用场景示意图。FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application.

图3示出了本申请实施例提供的一种认证方法的示意图。FIG. 3 is a schematic diagram of an authentication method provided by an embodiment of the present application.

图4示出了本申请实施例提供的另一种认证方法的示意图。FIG. 4 is a schematic diagram of another authentication method provided by an embodiment of the present application.

图5示出了本申请实施例提供的通信方法的示意图。FIG. 5 is a schematic diagram of a communication method provided by an embodiment of the present application.

图6示出了本申请实施例提供的另一通信方法的示意图。FIG. 6 is a schematic diagram of another communication method provided by an embodiment of the present application.

图7示出了本申请实施例提供的又一通信方法的示意图。FIG. 7 is a schematic diagram of still another communication method provided by an embodiment of the present application.

图8示出了本申请实施例提供的又一通信方法的示意图。FIG. 8 is a schematic diagram of still another communication method provided by an embodiment of the present application.

图9示出了本申请实施例提供的通信装置的示意性框图。FIG. 9 is a schematic block diagram of a communication apparatus provided by an embodiment of the present application.

图10示出了本申请实施例提供的另一通信装置的示意性框图。FIG. 10 is a schematic block diagram of another communication apparatus provided by an embodiment of the present application.

图11示出了本申请实施例提供的又一通信装置的示意性框图。FIG. 11 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.

图12示出了本申请实施例提供的通信系统的示意性框图。FIG. 12 is a schematic block diagram of a communication system provided by an embodiment of the present application.

图13示出了本申请实施例提供的又一通信装置的示意性框图。FIG. 13 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.

图14示出了本申请实施例提供的又一通信装置的示意性框图。FIG. 14 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.

图15示出了本申请实施例提供的又一通信装置的示意性框图。FIG. 15 is a schematic block diagram of still another communication apparatus provided by an embodiment of the present application.

具体实施方式Detailed ways

下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in the present application will be described below with reference to the accompanying drawings.

本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、未来的第五代(5th Generation,5G)系统或新无线(New Radio,NR)等。The technical solutions of the embodiments of the present application can be applied to various communication systems, such as a Global System of Mobile communication (GSM) system, a Code Division Multiple Access (CDMA) system, and a wideband code division multiple access. (Wideband Code Division Multiple Access, WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, LTE Frequency Division Duplex (FDD) system, LTE Time Division Duplex (TDD), Universal Mobile Telecommunication System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication system, and the future fifth generation (5th Generation, 5G) system or new radio (New Radio, NR) and so on.

图1示出了本申请实施例提供的系统架构图,包括:FIG. 1 is a system architecture diagram provided by an embodiment of the present application, including:

终端110,可以称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal)或未来5G网络中的终端等,该终端可以经无线接入网(radio access network,RAN)设备与一个或多个核心网设备进行通信,例如,终端可以是移动电话(或称为“蜂窝”电话)或具有移动终端的计算机等,又例如,终端可以是下一代家庭网关(next generation-residential gateway,NG-RG),再例如,终端还可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语音和/或数据。终端110可以用于与认证服务器120进行协商确定对该终端110进行认证所采用的认证方法。终端110还可以用于对认证服务器120进行认证。终端110还可以用于生成锚点密钥。The terminal 110 may be referred to as a user equipment (UE), a mobile station (MS), a mobile terminal, or a terminal in a future 5G network, and the terminal may pass through a radio access network (radio). The access network (RAN) device communicates with one or more core network devices, for example, the terminal may be a mobile phone (or "cellular" phone) or a computer with a mobile terminal, etc., for example, the terminal may be a next generation family A next generation-residential gateway (NG-RG), for example, the terminal may also be a portable, pocket-sized, handheld, computer-integrated or in-vehicle mobile device that exchanges voice and/or data with the wireless access network. The terminal 110 can be used to negotiate with the authentication server 120 to determine an authentication method used to authenticate the terminal 110. The terminal 110 can also be used to authenticate the authentication server 120. Terminal 110 can also be used to generate an anchor key.

认证服务器120,用于与终端110进行协商确定对终端110进行认证所采用的认证方法。该认证服务器120还可以用于对终端110进行认证。该认证服务器120还可以用于生成锚点密钥。The authentication server 120 is configured to negotiate with the terminal 110 to determine an authentication method used to authenticate the terminal 110. The authentication server 120 can also be used to authenticate the terminal 110. The authentication server 120 can also be used to generate an anchor key.

在一种可能的实现中,终端110与认证服务器120进行协商确定对终端110进行认证所采用的认证方法。终端110与认证服务器120利用该认证方法互相认证。当终端110确定认证服务器120合法,认证服务器120确定终端110是合法的情况下,终端110和认证服务器120可以生成锚点密钥,该锚点密钥用于终端与其他设备通信。In one possible implementation, the terminal 110 negotiates with the authentication server 120 to determine an authentication method used to authenticate the terminal 110. The terminal 110 and the authentication server 120 authenticate each other using the authentication method. When the terminal 110 determines that the authentication server 120 is legitimate and the authentication server 120 determines that the terminal 110 is legitimate, the terminal 110 and the authentication server 120 may generate an anchor key for the terminal to communicate with other devices.

图2示出了本申请实施例提供的应用场景示意图,包括:终端110,接入网设备130, 核心网设备140。FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application, including: a terminal 110, an access network device 130, and a core network device 140.

接入网设备130,可以是GSM或CDMA中的基站控制器(base station controller,BSC),也可以是WCDMA中的无线节点控制器(radio node controller,RNC),还可以是LTE中的演进型基站(evolved node B,eNB或e-NodeB),还可以是未来5G网络中的新型基站(例如,evolved LTE Node B,eLTE NB,或者next generantion node B,gNB)该接入网设备120可以是共享接入网设备,例如可以是多个公共陆地移动网络(public land mobile network,PLMN)共享的接入网设备。The access network device 130 may be a base station controller (BSC) in GSM or CDMA, or a radio node controller (RNC) in WCDMA, or may be an evolved type in LTE. The base station (evolved node B, eNB or e-NodeB) may also be a new type of base station in the future 5G network (for example, an evolved LTE Node B, an eLTE NB, or an next generantion node B, gNB). The access network device 120 may be The shared access network device may be, for example, an access network device shared by a plurality of public land mobile networks (PLMNs).

核心网设备140,可以包括:接入和移动管理功能(access and mobility management function,AMF)设备141、认证服务器功能(authentication server function,AUSF)设备142、统一数据管理设备(unified data management,UDM)143,可选的,核心网设备还可以包括移动性管理设备(mobility management entity,MME)、策略控制功能(policy control function,PCF)设备、用户端口功能(user port function,UPF)设备、AF、归属用户服务器(home subscriber server,HSS)等中的至少一种。The core network device 140 may include: an access and mobility management function (AMF) device 141, an authentication server function (AUSF) device 142, and a unified data management (UDM) device. 143. Optionally, the core network device may further include a mobility management entity (MME), a policy control function (PCF) device, a user port function (UPF) device, and an AF. At least one of a home subscriber server (HSS) and the like.

具体的,AMF141用于透传认证消息,并且根据AUSF142生成的锚点密钥对用户面数据和信令面数据进行加密保护。AUSF142作为EAP认证服务器,可以对终端进行认证,也可以生成锚点密钥发送给AMF141,使得AMF根据锚点密钥进行信令面数据和用户面数据的保护。UDM143可以根据终端的终端标识向相应的终端返回认证消息,例如认证是否通过的消息。Specifically, the AMF 141 is configured to transparently pass the authentication message, and encrypt and protect the user plane data and the signaling plane data according to the anchor key generated by the AUSF 142. As the EAP authentication server, the AUSF 142 can authenticate the terminal or generate an anchor key to be sent to the AMF 141, so that the AMF protects the signaling plane data and the user plane data according to the anchor key. The UDM 143 may return an authentication message to the corresponding terminal according to the terminal identifier of the terminal, for example, a message indicating whether the authentication is passed.

可选的,图1中的认证服务器120可以是图2中的AUSF142。Alternatively, the authentication server 120 in FIG. 1 may be the AUSF 142 in FIG. 2.

应理解,在本申请实施例中,移动性管理设备(移动性管理设备可以是AMF或者是MME)、认证服务器和数据管理设备等等仅是一个名字,名字本身对实体不构成限定。例如,该移动性管理设备也有可能被替换为“接入和移动性管理功能”或其它名字。而且,该移动性管理设备也可以对应一个包括除了接入和移动性管理功能外还有其他功能的网元。认证服务器也有可能被替换为“认证服务功能”或其它名字,而且,该认证服务器也可以对应一个包括除了用认证服务外还有其他功能的网元。在此进行统一说明,以下不再赘述。It should be understood that, in the embodiment of the present application, the mobility management device (the mobility management device may be AMF or MME), the authentication server, the data management device, and the like are only one name, and the name itself does not limit the entity. For example, the mobility management device may also be replaced with an "access and mobility management function" or other name. Moreover, the mobility management device may also correspond to a network element that includes other functions in addition to the access and mobility management functions. The authentication server may also be replaced with an "authentication service function" or other name, and the authentication server may also correspond to an network element including other functions in addition to the authentication service. A unified explanation is given here, and will not be described below.

也应理解,在本申请的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。It should also be understood that in the description of the present application, unless otherwise indicated, "/" means or means, for example, A/B may mean A or B; "and/or" herein is merely a description of the associated object. The association relationship indicates that there may be three relationships, for example, A and/or B, which may indicate that there are three cases in which A exists separately, A and B exist at the same time, and B exists separately. Also, in the description of the present application, "a plurality" means two or more than two unless otherwise stated. In addition, in order to facilitate the clear description of the technical solutions of the embodiments of the present application, in the embodiments of the present application, the words "first", "second", and the like are used to distinguish the same items or similar items whose functions and functions are substantially the same. Those skilled in the art can understand that the words "first", "second" and the like do not limit the number and execution order, and the words "first", "second" and the like are not necessarily limited.

在终端与接入网设备或者核心网设备传输数据之前,需要使用EAP进行认证,例如,如图3所示,在一种可能的认证方法200中,在方法200中以终端为NG-RG,认证服务器为AUSF,数据管理设备为UDM为例进行说明,但本申请实施例对此不作限制,方法200包括以下步骤:Before the terminal and the access network device or the core network device transmit data, the EAP is used for authentication. For example, as shown in FIG. 3, in a possible authentication method 200, the terminal is NG-RG in the method 200. The authentication server is an AUSF, and the data management device is a UDM as an example. However, the embodiment of the present application does not limit the method. The method 200 includes the following steps:

S201,终端向AUSF发送EAP消息,该EAP消息携带所述终端的终端标识,例如, 可以是终端的身份识别(identity,ID)。S201: The terminal sends an EAP message to the AUSF, where the EAP message carries the terminal identifier of the terminal, for example, may be an identity (ID) of the terminal.

S202,AUSF接收终端发送的EAP消息,并为该终端选择认证方法。S202. The AUSF receives the EAP message sent by the terminal, and selects an authentication method for the terminal.

举例来说,认证方法可以是基于账号密码认证的EAP质询握手验证协议(EAP-challenge handshake authentication protocol,EAP-CHAP)、EAP微软CHAP协议版本2(microsoft challenge handshake authentication protocol version 2,EAP-mschapv2)或EAP密码验证协议(EAP-password authentication protocol,EAP-PAP)认证方法还可以是基于全球用户识别(universal subscriber identity module,USIM)卡的增强认证和密钥协商机制(extensible authentication protocol method for third generation authentication and key agreement,EAP-AKA')或者EAP认证和密钥协商(EAP-authentication and key agreement,EAP-AKA)可扩展认证协议-客户识别模块(EAP-Subscriber Identity Module,EAP-SIM),认证方法还可以是基于证书认证的可扩展认证协议传输层安全(EAP-transport layer security,EAP-TLS),基于证书认证的可扩展认证协议隧道传输层安全(EAP-tunnel transport layer security,EAP-TTLS)。For example, the authentication method may be an EAP-challenge handshake authentication protocol (EAP-CHAP) based on account password authentication, and an EAP-CHSCH protocol version 2 (EAP-mschapv2). The EAP-Password Authentication Protocol (EAP-PAP) authentication method may also be an extensible authentication protocol method for third generation based on a universal subscriber identity module (USIM) card. Authentication and key agreement (EAP-AKA') or EAP-authentication and key agreement (EAP-AKA) extensible authentication protocol - EAP-Subscriber Identity Module (EAP-SIM), authentication The method may also be an EAP-transport layer security (EAP-TLS) based on certificate authentication, and an EAP-tunnel transport layer security (EAP-TT) based on certificate authentication. LS).

S203,AUSF生成随机数RAND-ausf。S203, the AUSF generates a random number RAND-ausf.

S204,AUSF向终端发送第一消息,第一消息中携带AUSF生成的随机数RAND-ausf,例如当在S202中AUSF选择了EAP-mschapv2,则第一消息可以是EAP-MschapV2中的挑战消息。S204, the AUSF sends a first message to the terminal, where the first message carries the random number RAND-ausf generated by the AUSF. For example, when the AUSF selects EAP-mschapv2 in S202, the first message may be a challenge message in EAP-MschapV2.

S205,终端接收AUSF发送的第一消息,根据第一消息中携带的RAND-ausf、终端的终端标识以及终端保存的自身的注册密码确定第一哈希值,例如可以通过RFC《draft-kamath-pppext-eap-mschapv2-02》计算哈希值。S205: The terminal receives the first message sent by the AUSF, and determines the first hash value according to the RAND-ausf carried in the first message, the terminal identifier of the terminal, and the registration password saved by the terminal, for example, the RFC draft-kamath- Pppext-eap-mschapv2-02" calculates the hash value.

S206,终端生成随机数RAND-rg。S206. The terminal generates a random number RAND-rg.

S207,终端向AUSF发送第二消息,该第二消息携带RAND-rg和第一哈希值,例如,第一消息是EAP-MschapV2的挑战消息时,则第二消息可以是EAP-MschapV2的响应消息。S207. The terminal sends a second message to the AUSF, where the second message carries the RAND-rg and the first hash value. For example, when the first message is the challenge message of the EAP-MschapV2, the second message may be the response of the EAP-MschapV2. Message.

S208,UDM保存有终端的注册密码,UDM向AUSF发送终端的注册密码,例如,UDM可以主动向AUSF发送终端的注册密码,或者可以是基于AUSF的请求向AUSF发送终端的注册密码。S208, the UDM stores the registration password of the terminal, and the UDM sends the registration password of the terminal to the AUSF. For example, the UDM may actively send the registration password of the terminal to the AUSF, or may send the registration password of the terminal to the AUSF based on the AUSF request.

S209,AUSF接收终端发送的第二消息,并且根据RAND-ausf、终端的终端标识以及AUSF获取到的终端的注册密码确定第二哈希值,确定第二哈希值的方法与确定第一哈希值的方法相同。AUSF利用第一哈希值和第二哈希值对终端进行认证。S209. The AUSF receives the second message sent by the terminal, and determines a second hash value according to the RAND-ausf, the terminal identifier of the terminal, and the registration password of the terminal acquired by the AUSF, and the method for determining the second hash value and determining the first hash. The method of the Greek value is the same. The AUSF authenticates the terminal with the first hash value and the second hash value.

具体来说,若第一哈希值等于第二哈希值,则AUSF认为终端合法。若第一哈希值不等于第二哈希值,则AUSF认为终端不合法,则向终端返回拒绝消息。Specifically, if the first hash value is equal to the second hash value, the AUSF considers the terminal legal. If the first hash value is not equal to the second hash value, the AUSF considers that the terminal is invalid, and returns a reject message to the terminal.

S210,AUSF利用RAND-rg,终端的终端标识以及AUSF获取到的终端的注册密码确定第三哈希值,确定第三哈希值的方法与确定第一哈希值的方法相同。S210, the AUSF determines the third hash value by using the RAND-rg, the terminal identifier of the terminal, and the registration password of the terminal acquired by the AUSF, and the method for determining the third hash value is the same as the method for determining the first hash value.

S211,AUSF向终端发送第三消息,第三消息中该带第三哈希值,若S202中AUSF选择了EAP-mschapv2方法,则第三消息可以是EAP-MschapV2的成功请求消息。S211. The AUSF sends a third message to the terminal. The third message has a third hash value. If the AUSF selects the EAP-mschapv2 method in S202, the third message may be a success request message of the EAP-MschapV2.

S212,终端接收AUSF发送的第三消息,并利用RANG-rg,终端的终端标识以及AUSF确定第四哈希值,终端利用第三哈希值和第四哈希值对AUSF进行认证。S212: The terminal receives the third message sent by the AUSF, and determines the fourth hash value by using the RANG-rg, the terminal identifier of the terminal, and the AUSF, and the terminal authenticates the AUSF by using the third hash value and the fourth hash value.

具体来说,若第三哈希值等于第四哈希值,则终端认为AUSF合法。若第三哈希值不等于第四哈希值,则终端认为AUSF不合法。Specifically, if the third hash value is equal to the fourth hash value, the terminal considers the AUSF to be legal. If the third hash value is not equal to the fourth hash value, the terminal considers the AUSF to be illegal.

S213,终端利用RANG-rg、RAND-ausf以及自身保存的注册密码确定锚点密钥,具体确定方法参见RFC 2759《Microsoft PPP CHAP Extensions,Version 2》。S213. The terminal determines the anchor key by using RANG-rg, RAND-ausf, and the registration password saved by itself. For the specific determination method, refer to RFC 2759 "Microsoft PPP CHAP Extensions, Version 2".

S214,终端向AUSF发送验证通过消息,用于指示AUSF验证通过。S214. The terminal sends an authentication pass message to the AUSF, to indicate that the AUSF verification is passed.

S215,AUSF利用RANG-rg、RAND-ausf以及获取到的终端的注册密码确定锚点密钥。S215, the AUSF determines the anchor key by using RANG-rg, RAND-ausf, and the acquired registration password of the terminal.

S216,AUSF向AMF发送锚点密钥,从而使得终端与AMF利用锚点密钥进行信令面数据和用户面数据的传输。S216. The AUSF sends an anchor key to the AMF, so that the terminal and the AMF use the anchor key to transmit the signaling plane data and the user plane data.

应理解,上述步骤的执行顺序并不是唯一确定的,例如,S213可以在S206之后S207之前,S215也可以在S207之后S208之前等。例如,S208可以在S209之前的任何步骤,本申请实施例对此不作限定。It should be understood that the order of execution of the above steps is not uniquely determined. For example, S213 may precede S207 after S206, and S215 may also wait before S207 and after S208. For example, S208 may be any step before S209, which is not limited by the embodiment of the present application.

在方法200中,有可能存在以下问题:In method 200, the following problems are likely to exist:

一、有可能在S202中,AUSF选择的认证方法有可能不是终端支持的认证方法,在这种情况下,则需要AUSF与终端多次信令交互来确定最终所采用的认证方法,这样会增加信令的开销,并且时延较高,例如信令交互的过程如图4所示,包括以下步骤:1. It is possible that in S202, the authentication method selected by the AUSF may not be the authentication method supported by the terminal. In this case, the AUSF and the terminal are required to perform multiple signaling interactions to determine the final authentication method, which will increase. The signaling overhead and the delay are high. For example, the process of signaling interaction is as shown in FIG. 4, and includes the following steps:

S301,终端向AUSF发送所述终端的终端标识,终端的终端标识可以是终端的ID。S301. The terminal sends the terminal identifier of the terminal to the AUSF, where the terminal identifier of the terminal may be the ID of the terminal.

S302,AUSF接收到所述终端的终端标识之后,根据所述终端的终端标识选择第一认证方法。应理解,有可能AUSF根据同一终端的终端标识有可能会选择不同的认证方法。S302. After receiving the terminal identifier of the terminal, the AUSF selects the first authentication method according to the terminal identifier of the terminal. It should be understood that it is possible that the AUSF may select different authentication methods according to the terminal identification of the same terminal.

S303,AUSF向终端发送选择的第一认证方法的起始消息,例如,若AUSF选择了EAP-SIM为第一认证方法之后,第一认证方法的起始消息为start消息,该start消息表示开始EAP-SIM的认证。S303, the AUSF sends the start message of the selected first authentication method to the terminal. For example, if the AUSF selects the EAP-SIM as the first authentication method, the start message of the first authentication method is a start message, and the start message indicates that the start message is started. EAP-SIM certification.

S304,终端接收到第一认证方法的起始消息之后,有可能终端不支持该第一认证方法,例如,终端支持第二认证方法,第二认证方法可以是EAP-MSchapv2方法和EAP-AKA’方法,终端向AUSF发送EAP-NAK消息,该EAP-NAK消息表示终端不支持第一认证方法,并且EAP-NAK消息中携带终端支持的第二认证方法(EAP-MSchapv2方法和EAP-AKA’方法)。S304. After the terminal receives the start message of the first authentication method, the terminal may not support the first authentication method. For example, the terminal supports the second authentication method, where the second authentication method may be the EAP-MSchapv2 method and the EAP-AKA' The method, the terminal sends an EAP-NAK message to the AUSF, where the EAP-NAK message indicates that the terminal does not support the first authentication method, and the EAP-NAK message carries the second authentication method supported by the terminal (EAP-MSchapv2 method and EAP-AKA' method) ).

S305,AUSF根据EAP-NAK消息中携带的终端支持的第二认证方法重新选择认证方法,例如,重新选择的认证方法为EAP-MSchapv2方法。S305. The AUSF reselects the authentication method according to the second authentication method supported by the terminal carried in the EAP-NAK message. For example, the reselected authentication method is the EAP-MSchapv2 method.

S306,AUSF向终端发送第二认证方法的起始消息,例如当选择了EAP-MSchapv2方法时,第二认证方法的起始消息可以是挑战消息。S306. The AUSF sends a start message of the second authentication method to the terminal. For example, when the EAP-MSchapv2 method is selected, the start message of the second authentication method may be a challenge message.

二、在S209中计算第二哈希值和S210中计算的第三哈希值所采用的终端的注册密码,需要从UDM获取,例如通过S208获取,这样,终端的注册密码在UDM和AUSF之间传输时,容易被攻击者截获,从而会造成终端注册密码的泄露,进一步会导致攻击者伪造第二哈希值和第三哈希值,从而影响终端和AUSF进行互相认证的准确性。2. The registration password of the terminal used to calculate the second hash value and the third hash value calculated in S210 in S209 needs to be obtained from the UDM, for example, by S208, so that the registration password of the terminal is in UDM and AUSF. When the transmission is interrupted, it is easily intercepted by the attacker, which may result in the leakage of the terminal registration password, which may further cause the attacker to forge the second hash value and the third hash value, thereby affecting the accuracy of mutual authentication between the terminal and the AUSF.

三、在S213和S215中,利用终端的注册密码、RAND-rg、RAND-ausf确定锚点密钥,由于RAND-rg和RAND-ausf在终端与AUSF之间采用明文的方式传输,容易泄露,若终端的注册密码被攻击者破解,则攻击者就可以伪造锚点密钥,这样会导致传输数据的安全性受到限制。3. In S213 and S215, the anchor key is determined by using the registration password of the terminal, RAND-rg, and RAND-ausf. Since RAND-rg and RAND-ausf are transmitted in clear text between the terminal and the AUSF, it is easy to leak. If the terminal's registration password is cracked by the attacker, the attacker can forge the anchor key, which will limit the security of the transmitted data.

在本申请实施例中,针对上述第一个问题,可以在终端向认证服务器发起注册的消息中携带终端所支持的至少一种认证方法,这样认证服务器在选择认证方法时,可以在终 端所支持的至少一种认证方法以及认证服务器支持的至少一种认证方法选择对终端进行认证所采用的认证方法。例如,在终端支持的至少一种认证方法和认证服务器支持的认证方法中取交集,在交集中选择对终端进行认证所采用的认证方法。针对上述第二个问题,在认证服务器和终端进行互相认证时,数据管理设备可以计算在认证时需要的验证值,并将验证值发送给认证服务器,例如,验证值可以是第二哈希值和第三哈希值,这样,可以避免终端的注册密码在认证服务器和数据管理设备之间传输而导致的被截获的情形。针对上述第三个问题,在终端和认证服务器计算锚点密钥时,可以利用随机数来计算锚点密钥,可以利用随机数取代终端的注册密码来避免当终端的注册密码被截获时而导致的安全性受到限制的情形。In the embodiment of the present application, for the foregoing first problem, at least one authentication method supported by the terminal may be carried in the message that the terminal initiates registration with the authentication server, so that the authentication server can be supported by the terminal when selecting the authentication method. At least one authentication method and at least one authentication method supported by the authentication server select an authentication method used to authenticate the terminal. For example, an intersection method is adopted in at least one authentication method supported by the terminal and an authentication method supported by the authentication server, and an authentication method used for authenticating the terminal is selected in the intersection. For the second problem, when the authentication server and the terminal perform mutual authentication, the data management device can calculate the verification value required at the time of authentication, and send the verification value to the authentication server, for example, the verification value can be the second hash value. And the third hash value, in this way, the intercepted situation caused by the transmission of the terminal's registration password between the authentication server and the data management device can be avoided. For the third problem mentioned above, when the terminal and the authentication server calculate the anchor key, the random number can be used to calculate the anchor key, and the random number can be used to replace the registration password of the terminal to avoid when the terminal registration password is intercepted. The situation in which security is limited.

下面结合附图对本申请实施例的通信方法进行描述。The communication method of the embodiment of the present application will be described below with reference to the accompanying drawings.

图5示出了本申请实施例提供的通信方法400,该方法400包括:FIG. 5 shows a communication method 400 provided by an embodiment of the present application. The method 400 includes:

S410,终端获取第一随机数。S410. The terminal acquires a first random number.

可选的,该第一随机数可以是终端生成的也可以是其他设备生成的发送给终端的。Optionally, the first random number may be generated by the terminal or sent by the other device and sent to the terminal.

第一随机数用于代替终端的注册密码来生成锚点密钥,一种可能的实现是,终端每建立一次会话生成一次第一随机数。另一种可能的实现是,第一随机数可以周期性更新,例如,第一随机数的更新频率可以根据网络的安全性要求来确定,例如,当前网络的安全性很好,则第一随机数的更新频率较低,当前的网络安全性很差,则第一随机数的更新频率较高,又例如,第一随机数的更新频率固定,可以是每隔一小时更新一次。The first random number is used to generate the anchor key instead of the registration password of the terminal. One possible implementation is that the terminal generates the first random number every time the session is established. Another possible implementation is that the first random number can be periodically updated. For example, the update frequency of the first random number can be determined according to the security requirements of the network. For example, if the security of the current network is good, the first random number is The update frequency of the number is low, and the current network security is poor. The update frequency of the first random number is high. For example, the update frequency of the first random number is fixed, and may be updated every hour.

S420,所述终端根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。S420. The terminal determines, according to the first random number, the second random number, and the third random number, an anchor key, where the anchor key is used for communication by the terminal.

可选的,终端和认证服务器也可以利用第二随机数和第三随机数进行互相认证。可选的,当终端和认证服务器在采用第二随机数和第三随机数进行互相认证之后,认证服务器确定终端是合法的,终端确定认证服务器是合法的情况下,终端和认证服务器利用第二随机数和第三随机数确定锚点密钥。Optionally, the terminal and the authentication server may also perform mutual authentication by using the second random number and the third random number. Optionally, after the terminal and the authentication server perform mutual authentication by using the second random number and the third random number, the authentication server determines that the terminal is legal, and if the terminal determines that the authentication server is legal, the terminal and the authentication server use the second. The random number and the third random number determine the anchor key.

作为一个可选实施例,所述第二随机数可以是终端生成的。As an optional embodiment, the second random number may be generated by a terminal.

可选的,所述方法还包括:终端获取第三随机数,例如,终端接收来自认证服务器的第三随机数。即在本申请实施例终端根据自身获取的第一随机数,自身生成的第二随机数以及来自认证服务器的第三随机数确定会话密钥。Optionally, the method further includes: the terminal acquiring the third random number, for example, the terminal receiving the third random number from the authentication server. That is, in the embodiment of the present application, the terminal determines the session key according to the first random number acquired by itself, the second random number generated by itself, and the third random number from the authentication server.

S430,所述终端对所述第一随机数进行加密,得到加密后的第一随机数;所述终端向认证服务器发送所述加密后的第一随机数。认证服务器接收来自终端的加密后的第一随机数。例如,认证服务器可以是AUSF。S430. The terminal encrypts the first random number to obtain an encrypted first random number. The terminal sends the encrypted first random number to an authentication server. The authentication server receives the encrypted first random number from the terminal. For example, the authentication server can be an AUSF.

作为一个可选实施例,S430,包括:所述终端利用第一密钥对所述第一随机数进行加密,得到加密后的第一随机数。As an optional embodiment, S430 includes: the terminal encrypting the first random number by using a first key to obtain an encrypted first random number.

S440,所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥。S440. The authentication server determines an anchor key according to the encrypted first random number, the second random number, and the third random number.

可选的,所述认证服务器获取第二随机数和第三随机数,具体地,认证服务器可以接收来自终端发送的第二随机数,认证服务器自身确定第三随机数,或者认证服务器接收来自数据管理设备的第三随机数,或者认证服务接收来自移动管理设备的第三随机数。Optionally, the authentication server obtains the second random number and the third random number. Specifically, the authentication server may receive the second random number sent by the terminal, the authentication server itself determines the third random number, or the authentication server receives the data from the data. The third random number of the device is managed, or the authentication service receives a third random number from the mobility management device.

作为一个可选实施例,S440,包括:所述认证服务器利用第二密钥对所述加密后的第 一随机数进行解密,得到所述第一随机数,其中,所述第二密钥为与所述第一密钥对应的密钥,即所述第二密钥用于解密使用第一密钥加密后的信息;所述认证服务器利用所述第一随机数、第二随机数和第三随机数,确定所述锚点密钥。As an optional embodiment, S440 includes: the authentication server decrypts the encrypted first random number by using a second key to obtain the first random number, where the second key is a key corresponding to the first key, that is, the second key is used to decrypt information encrypted using the first key; the authentication server uses the first random number, the second random number, and the first The three random numbers determine the anchor key.

具体来说,所述认证服务器利用第二密钥对所述加密后的第一随机数进行解密得到第一随机数,所述认证服务器利用所述第一随机数、所述第二随机数和所述第三随机数生成所述锚点密钥。这样,可以利用第一随机数取代终端的注册密码来确定锚点密钥,可以提高确定锚点密钥的准确性,并且随机数也具有随机性,并且可以经常变更,例如可以由终端在每次会话建立时生成,避免了长期采用固定的终端的注册密码的而造成的安全性问题。Specifically, the authentication server decrypts the encrypted first random number by using a second key to obtain a first random number, and the authentication server uses the first random number, the second random number, and The third random number generates the anchor key. In this way, the first random number can be used to replace the registration password of the terminal to determine the anchor key, and the accuracy of determining the anchor key can be improved, and the random number is also random, and can be changed frequently, for example, by the terminal. The session is generated when the session is established, which avoids the security problem caused by the long-term use of the fixed terminal registration password.

可选的,所述第一密钥和所述第二密钥可以为一对非对称密钥,所述第一密钥为公钥,所述第二密钥为私钥。可选的,所述第一密钥和所述第二密钥为一对对称密钥,即第一密钥和第二密钥相同,例如,所述第一密钥和第二密钥为迪菲-赫尔曼(Diffie-Hellman,DH)算法生成的一对相同的密钥。Optionally, the first key and the second key may be a pair of asymmetric keys, the first key is a public key, and the second key is a private key. Optionally, the first key and the second key are a pair of symmetric keys, that is, the first key and the second key are the same, for example, the first key and the second key are A pair of identical keys generated by the Diffie-Hellman (DH) algorithm.

可选的,认证服务器需要同时为多个终端提供服务,因此,认证服务器上可以保存不同终端对应的密钥,当认证服务器接收到一个终端发送的加密后的第一随机数之后,认证服务器可以根据该终端的标识在自身保存的多个密钥中确定对加密后的第一随机数进行解密的第二密钥。Optionally, the authentication server needs to provide services for multiple terminals at the same time. Therefore, the authentication server can store keys corresponding to different terminals. After the authentication server receives the encrypted first random number sent by the terminal, the authentication server can Determining a second key for decrypting the encrypted first random number among the plurality of keys saved by the terminal according to the identifier of the terminal.

S450,所述认证服务器向移动性管理设备发送所述锚点密钥。这样,所述移动性管理设备根据所述锚点密钥与终端进行通信。S450. The authentication server sends the anchor key to the mobility management device. In this way, the mobility management device communicates with the terminal according to the anchor key.

具体来说,所述终端可以根据所述锚点密钥与移动性管理设备进行通信,或者所述终端可以根据所述锚点密钥与接入网设备进行通信。可选的,锚点密钥可以是用于传输控制面数据的密钥,也可以是用于传输用户面数据的密钥。可选的,可以根据锚点密钥生成下层密钥,不同的设备之间利用下层密钥进行通信。Specifically, the terminal may communicate with the mobility management device according to the anchor key, or the terminal may communicate with the access network device according to the anchor key. Optionally, the anchor key may be a key used to transmit control plane data, or may be a key used to transmit user plane data. Optionally, the lower layer key may be generated according to the anchor key, and different devices use the lower layer key to communicate.

举例来说,移动性管理设备和终端可以根据锚点密钥生成第二锚点密钥和第三锚点密钥,第二锚点密钥用于终端与移动性管理设备进行通信,第二锚点密钥用于终端与接入网设备进行通信。又例如,移动性设备和终端可以根据锚点密钥生成第四锚点密钥、第五锚点密钥、第六锚点密钥和第七锚点密钥,第四密钥用于终端与移动性管理设备进行控制面数据的通信,第五密钥用于终端与移动性设备进行用户面数据的通信,第六密钥用于终端与接入网设备进行控制面数据的通信,第七密钥用于终端与接入网设备进行用户面数据的通信。For example, the mobility management device and the terminal may generate a second anchor key and a third anchor key according to the anchor key, where the second anchor key is used for the terminal to communicate with the mobility management device, and second The anchor key is used by the terminal to communicate with the access network device. For another example, the mobility device and the terminal may generate a fourth anchor key, a fifth anchor key, a sixth anchor key, and a seventh anchor key according to the anchor key, and the fourth key is used for the terminal. Controlling surface data communication with the mobility management device, the fifth key is used for communication between the terminal and the mobile device for user plane data, and the sixth key is used for communication between the terminal and the access network device for control plane data, The seven keys are used for communication between the terminal and the access network device for user plane data.

作为一个可选实施例,在终端与认证服务器确定锚点密钥之前,所述终端与所述认证服务器可以进行互相认证。在所述终端和认证服务器进行互相认证之前,可以确定终端和认证服务器进行互相认证的认证方法。所述方法还包括:所述认证服务器接收所述终端发送的所述终端支持的一种或两种及以上的认证方法;所述认证服务器根据所述终端支持的一种或两种及以上的认证方法以及自身支持的认证方法,确定对所述终端进行认证所采用的第一认证方法。As an optional embodiment, the terminal and the authentication server may perform mutual authentication before the terminal and the authentication server determine the anchor key. Before the terminal and the authentication server perform mutual authentication, an authentication method in which the terminal and the authentication server perform mutual authentication may be determined. The method further includes: the authentication server receiving one or two or more authentication methods supported by the terminal by the terminal; the authentication server is based on one or two or more supported by the terminal The authentication method and the authentication method supported by itself determine the first authentication method used to authenticate the terminal.

可选的,所述终端在向认证服务器发送的注册消息中携带所述终端支持的一种或两种及以上的认证方法,所述认证服务器接收所述终端发送的注册消息,在注册消息中获取所述终端支持的一种或两种及以上的认证方法。例如,认证服务器可以在终端支持的一种或 两种及以上的认证方法和自身支持的认证方法中取交集,若交集中只包括一个元素,即一个认证方法,则该认证方法为第一认证方法。若交集中包括了两个以上的元素,即两个以上的认证方法,则认证方法可以为这两个以上认证方法中的任意一个。例如,终端支持认证方法1、认证方法2和认证方法3,认证服务器支持认证方法2、认证方法3和认证方法4,则认证服务器可以在认证方法2和认证方法3中任选一个作为对终端进行认证所采用的认证方法。Optionally, the terminal carries one or two or more authentication methods supported by the terminal in the registration message sent by the terminal, where the authentication server receives the registration message sent by the terminal, in the registration message. Obtain one or two or more authentication methods supported by the terminal. For example, the authentication server may take the intersection of one or two or more authentication methods supported by the terminal and the authentication method supported by the terminal. If the intersection includes only one element, that is, one authentication method, the authentication method is the first authentication. method. If the intersection includes more than two elements, that is, two or more authentication methods, the authentication method may be any one of the two or more authentication methods. For example, the terminal supports the authentication method 1, the authentication method 2, and the authentication method 3. The authentication server supports the authentication method 2, the authentication method 3, and the authentication method 4. The authentication server may select one of the authentication method 2 and the authentication method 3 as the terminal. The authentication method used for certification.

可选的,所述认证服务器接收所述终端发送的所述终端支持的一种或两种及以上的认证方法以及所述一种或两种及以上的认证方法中每种认证方法的优先级,所述认证服务器根据所述终端支持的一种或两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法,包括:所述认证服务器根据所述终端支持的一种或两种以上的认证方法中每种认证方法的优先级以及所述认证服务器支持的认证方法,确定所述第一认证方法。例如,认证服务器可以在终端支持的一种或两种以上的认证方法和认证服务器自身支持的认证方法中取交集,若交集中只包括一个元素,即一个认证方法,则该认证方法为第一认证方法,若交集中包括了两个以上的元素,即两个以上的认证方法,则认证服务器就可以优先选择交集中优先级较高的认证方法作为第一认证方法。所述认证服务器根据所述终端支持的一种或两种以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的认证方法,这样,可以避免终端与认证服务器信令交互所带来的信令开销问题。例如,终端支持认证方法1、认证方法2和认证方法3,认证方法3的优先级高于认证方法2的优先级,认证方法2的优先级高于认证方法1的优先级,认证服务器支持认证方法2、认证方法3和认证方法4,则认证服务器可以在认证方法2和认证方法3中选择认证方法3作为第一认证方法。Optionally, the authentication server receives one or two or more authentication methods supported by the terminal and the priority of each one of the one or two or more authentication methods. Determining, by the authentication server, a first authentication method used for performing authentication on the terminal according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, including: The authentication server determines the first authentication method according to a priority of each of the one or more authentication methods supported by the terminal and an authentication method supported by the authentication server. For example, the authentication server may take an intersection in one or more authentication methods supported by the terminal and an authentication method supported by the authentication server itself. If the intersection includes only one element, that is, an authentication method, the authentication method is first. In the authentication method, if the intersection includes more than two elements, that is, two or more authentication methods, the authentication server may preferentially select the authentication method with higher priority in the intersection as the first authentication method. The authentication server determines an authentication method used to perform authentication on the terminal according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, so that the terminal and the authentication server can be avoided. Signaling overhead caused by signaling interaction. For example, the terminal supports the authentication method 1, the authentication method 2, and the authentication method 3. The priority of the authentication method 3 is higher than the priority of the authentication method 2, the priority of the authentication method 2 is higher than the priority of the authentication method 1, and the authentication server supports the authentication. In the method 2, the authentication method 3, and the authentication method 4, the authentication server may select the authentication method 3 as the first authentication method in the authentication method 2 and the authentication method 3.

可选的,在认证服务器确定了第一认证方法之后,可以将第一认证方法的标识发送给数据管理设备,以便于所述数据管理设备将该第一认证方法的标识保存到终端的相关信息中,例如终端的上下文中。可选的,数据管理设备也可以不接收第一认证方法的标识,而是根据预设的认证方法确定第一验证值和第二验证值。本申请实施例对此不作限定。Optionally, after the authentication server determines the first authentication method, the identifier of the first authentication method may be sent to the data management device, so that the data management device saves the identifier of the first authentication method to related information of the terminal. Medium, for example in the context of a terminal. Optionally, the data management device may not receive the identifier of the first authentication method, but determine the first verification value and the second verification value according to the preset authentication method. This embodiment of the present application does not limit this.

作为一个可选实施例,所述方法400还包括:所述认证服务器从数据管理设备获取第一验证值和第二验证值;所述认证服务器根据所述第一验证值对所述终端进行认证。所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值,这样终端就可以根据第二验证值对所述认证服务器进行认证。可选的,前述的确定锚点密钥可以是在认证服务器根据所述第一验证值对所述终端进行认证之后,即当认证服务器认证终端是合法的情况下,认证服务器和终端再确定锚点密钥。As an optional embodiment, the method 400 further includes: the authentication server acquiring a first verification value and a second verification value from the data management device; the authentication server authenticating the terminal according to the first verification value . The authentication server sends the second verification value to the terminal when the result of authenticating the terminal is legal, so that the terminal can authenticate the authentication server according to the second verification value. Optionally, the foregoing determining the anchor key may be after the authentication server authenticates the terminal according to the first verification value, that is, when the authentication server authenticates the terminal, the authentication server and the terminal determine the anchor again. Point key.

作为一个可选实施例,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体为:向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数,接收所述数据管理设备发送的所述第一验证值和所述第二验证值。其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定,例如,第一验证值由数据管理设备利用第一认证方法根据所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定。所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。例如,第二验证值由数据管理设备利用第一认证方法根据所述终端标识、所述数据管理设备保存 的所述终端的注册密码以及所述第二随机数确定。As an optional embodiment, the authentication server obtains the first verification value and the second verification value from the data management device, specifically: sending, to the data management device, the terminal identifier of the terminal, the second random number, and The third random number receives the first verification value and the second verification value sent by the data management device. The first verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the third random number. For example, the first verification value is used by the data management device to use the first authentication. The method is determined according to the terminal identifier, a registration password of the terminal saved by the data management device, and the third random number. The second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number. For example, the second verification value is determined by the data management device using the first authentication method according to the terminal identification, the registration password of the terminal held by the data management device, and the second random number.

具体地,认证服务器对终端的认证过程包括以下步骤:Specifically, the authentication process of the authentication server to the terminal includes the following steps:

1、所述认证服务器向所述终端发送所述第三随机数。1. The authentication server sends the third random number to the terminal.

2、所述终端接收来自所述认证服务器的所述第三随机数,并且根据所述终端的终端标识、所述第三随机数以及所述终端保存的自身的注册密码确定第三验证值,例如利用第一认证方法根据所述终端标识、所述第三随机数以及所述终端保存的自身的注册密码确定第三验证值。2. The terminal receives the third random number from the authentication server, and determines a third verification value according to the terminal identifier of the terminal, the third random number, and a registration password saved by the terminal. For example, the third authentication value is determined according to the terminal identifier, the third random number, and the registration password saved by the terminal by using the first authentication method.

3、所述终端向所述认证服务器发送所述第三验证值,所述认证服务器接收所述终端发送的第三验证值,并根据所述第三验证值以及第一验证值对所述终端的合法性进行验证。具体来说,若所述第三验证值等于所述第一验证值,则所述认证服务器确定所述终端合法;若所述第三验证值不等于所述第一验证值,则所述认证服务器确定所述终端不合法。可选的,当所述认证服务器确定所述终端不合法时,所述认证服务器向所述终端发送拒绝消息,用于指示所述终端由于不合法被所述认证服务器拒绝。The terminal sends the third verification value to the authentication server, the authentication server receives a third verification value sent by the terminal, and pairs the terminal according to the third verification value and the first verification value. Validity of the legality. Specifically, if the third verification value is equal to the first verification value, the authentication server determines that the terminal is legal; if the third verification value is not equal to the first verification value, the authentication The server determines that the terminal is illegal. Optionally, when the authentication server determines that the terminal is not legal, the authentication server sends a reject message to the terminal, to indicate that the terminal is rejected by the authentication server because it is illegal.

应理解,第一验证值和第三验证值采用相同的认证方法得到,例如第一验证值和第三验证值可以采用预设的认证方法或者前述第一认证方法得到。It should be understood that the first verification value and the third verification value are obtained by the same authentication method. For example, the first verification value and the third verification value may be obtained by using a preset authentication method or the foregoing first authentication method.

具体地,终端对认证服务器的认证过程包括以下步骤:Specifically, the authentication process of the terminal to the authentication server includes the following steps:

1、所述数据管理设备根据所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码以及第二随机数确定第二验证值。1. The data management device determines a second verification value according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and a second random number.

2、所述数据管理设备向所述认证服务器发送所述第二验证值。2. The data management device sends the second verification value to the authentication server.

3、所述认证服务器接收所述数据管理设备发送的所述第二验证值,并将所述第二验证值发送给终端。3. The authentication server receives the second verification value sent by the data management device, and sends the second verification value to the terminal.

4、所述终端接收所述认证服务器发送的所述第二验证值,所述终端根据所述终端的终端标识、所述终端保存的自身的注册密码以及第二随机数确定第四验证值。The terminal receives the second verification value sent by the authentication server, and the terminal determines a fourth verification value according to the terminal identifier of the terminal, the registration password saved by the terminal, and the second random number.

5、所述终端根据所述第二验证值和所述第四验证值对所述认证服务器的合法性进行认证。具体来说,若所述第二验证值等于所述第四验证值,则所述终端确定所述认证服务器合法;若所述第二验证值不等于所述第四验证值,则所述终端确定所述认证服务器不合法。可选的,当所述终端确定所述认证服务器不合法时,所述终端向所述认证服务器发送拒绝消息,用于指示所述认证服务器由于不合法被所述终端拒绝。5. The terminal authenticates the validity of the authentication server according to the second verification value and the fourth verification value. Specifically, if the second verification value is equal to the fourth verification value, the terminal determines that the authentication server is legal; if the second verification value is not equal to the fourth verification value, the terminal It is determined that the authentication server is illegal. Optionally, when the terminal determines that the authentication server is invalid, the terminal sends a reject message to the authentication server, to indicate that the authentication server is rejected by the terminal because it is illegal.

应理解,第二验证值和第四验证值采用相同的认证方法得到,例如第二验证值和第四验证值可以采用前述的第一认证方法或者预设的认证方法得到。It should be understood that the second verification value and the fourth verification value are obtained by the same authentication method. For example, the second verification value and the fourth verification value may be obtained by using the foregoing first authentication method or a preset authentication method.

可选的,终端和认证服务器可以先相互认证,当互相认证合法之后,再各自确定锚定密钥,即执行步骤420和步骤440,其中,确定锚点密钥使用的第二随机数和第三随机数就是互相认证过程中所采用的随机数。Optionally, the terminal and the authentication server may mutually authenticate each other. After the mutual authentication is legal, each of the anchor keys is determined, that is, step 420 and step 440 are performed, where the second random number and the first use of the anchor key are determined. The three random numbers are the random numbers used in the mutual authentication process.

需要说明的是,第一验证值和第三验证值是相同的认证方法得到的。第二验证值和第四验证值是相同的认证方法得到的。相同的认证方法可以是预设的认证方法,或者是认证服务器和终端协商确定的认证方法。可选的,前述的第一验证值、第二验证值、第三验证值和第四验证值可以为采用哈希算法得到的四个哈希值。当然,前述的第一验证值、第二验证值、第三验证值和第四验证值也可以是采用其他认证算法得到的,本申请实施例对终端和认证服务器在认证过程中使用的认证算法不作限制。It should be noted that the first verification value and the third verification value are obtained by the same authentication method. The second verification value and the fourth verification value are obtained by the same authentication method. The same authentication method may be a preset authentication method, or an authentication method determined by the authentication server and the terminal. Optionally, the foregoing first verification value, second verification value, third verification value, and fourth verification value may be four hash values obtained by using a hash algorithm. Certainly, the foregoing first verification value, the second verification value, the third verification value, and the fourth verification value may also be obtained by using another authentication algorithm, and the authentication algorithm used by the terminal and the authentication server in the authentication process in the embodiment of the present application. No restrictions.

应理解,方法400中,举例说明了由终端生成第一随机数,并将加密后的第一随机数可以发送给认证服务器。在实际应用中,认证服务器也可以生成第一随机数,将加密后的第一随机数发送给终端。或者,第三方设备可以生成第一随机数,并将加密后的第一随机数发送给认证服务器和终端,本申请实施例对第一随机数的生成方式并不作任何限定。It should be understood that in the method 400, the first random number generated by the terminal is generated, and the encrypted first random number can be sent to the authentication server. In an actual application, the authentication server may also generate a first random number, and send the encrypted first random number to the terminal. Alternatively, the third-party device may generate the first random number, and send the encrypted first random number to the authentication server and the terminal. The method for generating the first random number is not limited in this embodiment.

也应理解,在本申请实施例中,确定锚点密钥所采用的算法可以是哈希算法,也可以是伪随机函数(pseudo-random function,PRF)的算法,本申请实施例对认证服务器采用何种算法计算锚点密钥并不作任何限制。It should also be understood that, in the embodiment of the present application, the algorithm used to determine the anchor key may be a hash algorithm or a pseudo-random function (PRF) algorithm. There is no limit to what algorithm is used to calculate the anchor key.

图6示出了本申请实施例提供的通信方法500,该方法500包括:FIG. 6 shows a communication method 500 provided by an embodiment of the present application. The method 500 includes:

S510,所述认证服务器向数据管理设备发送所述终端的终端标识、第二随机数和所述第三随机数;所述数据管理设备接收所述认证服务器发送的所述终端的终端标识、第二随机数和所述第三随机数。S510, the authentication server sends the terminal identifier, the second random number, and the third random number of the terminal to the data management device; the data management device receives the terminal identifier of the terminal sent by the authentication server, Two random numbers and the third random number.

可选的,在S510之前,方法还包括:所述认证服务器获取终端的终端标识、第二随机数和所述第三随机数。可选的,终端向认证服务器发送的注册消息中携带所述终端的终端标识,所述认证服务器在注册消息中获取所述终端的终端标识。可选的,第二随机数可以是终端生成的,终端向认证服务器发送的鉴权请求消息中携带所述第二随机数,所述认证服务器在鉴权请求消息中获取所述第二随机数。可选的,终端可以在同一条消息中向认证服务器发送所述终端的终端标识以及所述第二随机数。当然,本申请实施例对认证服务器获取终端的终端标识、第二随机数方式并不作任何限定。可选的,第三随机数可以是认证服务器生成的,也可以是网络侧的其他设备生成并发送给认证服务器的。Optionally, before S510, the method further includes: the authentication server acquiring the terminal identifier, the second random number, and the third random number of the terminal. Optionally, the registration message sent by the terminal to the authentication server carries the terminal identifier of the terminal, and the authentication server obtains the terminal identifier of the terminal in the registration message. Optionally, the second random number may be generated by the terminal, where the terminal sends the second random number to the authentication request message sent by the authentication server, where the authentication server obtains the second random number in the authentication request message. . Optionally, the terminal may send the terminal identifier of the terminal and the second random number to the authentication server in the same message. Certainly, the embodiment of the present application does not limit the manner in which the authentication server obtains the terminal identifier and the second random number of the terminal. Optionally, the third random number may be generated by the authentication server, or may be generated by other devices on the network side and sent to the authentication server.

S520,所述数据管理设备根据所述终端的终端标识、所述第二随机数和所述第三随机数确定第一验证值和第二验证值。S520. The data management device determines a first verification value and a second verification value according to the terminal identifier of the terminal, the second random number, and the third random number.

作为一个可选实施例,S520,包括:所述数据管理设备根据所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码、所述第二随机数确定所述第二验证值,例如,利用第一认证方法根据所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定所述第二验证值,该第一认证方法可以是预设的认证方法,也可以是认证服务器与终端协商确定并发送给数据管理设备的;所述数据管理设备根据所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定所述第一验证值,例如,利用第一认证方法根据所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码和所述第三随机数确定第一验证,该第一认证方法可以是预设的认证方法,也可以是认证服务器与终端协商确定并将发送给数据管理设备的。As an optional embodiment, S520, the data management device determines the second verification according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and the second random number. a value, for example, determining, by the first authentication method, the second verification value according to the terminal identifier of the terminal, the registration password of the terminal saved by the data management device, and the second random number, the first authentication method The method may be a preset authentication method, or may be determined by the authentication server and the terminal to be determined and sent to the data management device; the data management device is configured according to the terminal identifier of the terminal, and the terminal registration of the data management device The password and the third random number determine the first verification value, for example, using a first authentication method according to a terminal identifier of the terminal, a registration password of the terminal saved by the data management device, and the third random number The number determines the first verification, the first authentication method may be a preset authentication method, or the authentication server negotiates with the terminal to determine and Sent to the data management device.

S530,所述数据管理设备向所述认证服务器发送所述第一验证值和所述第二验证值。S530. The data management device sends the first verification value and the second verification value to the authentication server.

S540,所述认证服务器根据所述第一验证值对终端进行认证。S540. The authentication server authenticates the terminal according to the first verification value.

S550,所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送第二验证值,所述终端接收所述认证服务器发送的所述第二验证值。S550. The authentication server sends a second verification value to the terminal when the result of authenticating the terminal is legal, and the terminal receives the second verification value sent by the authentication server.

S560,所述终端根据所述第二验证值对所述认证服务器进行认证。S560. The terminal authenticates the authentication server according to the second verification value.

在本申请实施例中,数据管理设备可以生成第一验证值和第二验证值,在生成第一验证值和第二验证值时,可以利用数据管理设备保存的终端的注册密码生成第一验证值和第二验证值,这样,可以避免终端的注册密码在认证服务器和数据管理设备之间传输而造成的注册密码的泄露的问题,从而提高数据的安全性。In the embodiment of the present application, the data management device may generate the first verification value and the second verification value. When generating the first verification value and the second verification value, the first verification may be generated by using the registration password of the terminal saved by the data management device. The value and the second verification value, so that the leakage of the registration password caused by the transmission password of the terminal between the authentication server and the data management device can be avoided, thereby improving data security.

图7示出了本申请实施例提供的通信方法600,下面以终端为NG-RG,认证服务器为AUSF,数据管理设备为UDM举例进行说明,该方法600包括:FIG. 7 shows a communication method 600 provided by an embodiment of the present application. The following describes an example in which the terminal is an NG-RG, the authentication server is an AUSF, and the data management device is a UDM. The method 600 includes:

S601,NG-RG确定第一密钥,以及AUSF确定第二密钥。S601, the NG-RG determines the first key, and the AUSF determines the second key.

可选的,第一密钥和第二密钥为一对非对称密钥,即第一密钥可以是公钥,第二密钥可以是私钥。Optionally, the first key and the second key are a pair of asymmetric keys, that is, the first key may be a public key, and the second key may be a private key.

可选的,第一密钥和第二密钥也可以是相同的一对对称密钥,例如,第一密钥和第二密钥可以是DH算法确定的一对相同的密钥。Optionally, the first key and the second key may also be the same pair of symmetric keys. For example, the first key and the second key may be a pair of identical keys determined by the DH algorithm.

S602,NG-RG在向AUSF发送注册消息时,在注册消息中携带NG-RG的ID以及所述NG-RG支持的认证方法,例如注册消息可以是EAP消息。S602. When sending the registration message to the AUSF, the NG-RG carries the ID of the NG-RG and the authentication method supported by the NG-RG in the registration message, for example, the registration message may be an EAP message.

S603,AUSF接收AN-RG发送的注册消息,在注册消息中获取NG-RG的ID以及NG-RG支持的认证方法,并且根据NG-RG支持的认证方法以及AUSF支持的认证方法选择对NG-RG进行认证时所采用的认证方法。S603. The AUSF receives the registration message sent by the AN-RG, obtains the ID of the NG-RG and the authentication method supported by the NG-RG in the registration message, and selects the NG- according to the authentication method supported by the NG-RG and the authentication method supported by the AUSF. The authentication method used by RG for certification.

S604,AUSF获取随机数RAND-ausf,其中,RAND-ausf可以是前述的第三随机数。S604. The AUSF obtains a random number RAND-ausf, where RAND-ausf may be the foregoing third random number.

AUSF获取随机数RAND-ausf,具体可以包括如下几种方法:AUSF可以自己生成RAND-ausf;或者AUSF向UDM请求一个随机数,UDM生成RAND-ausf,并将RAND-ausf发送给AUSF;或者是AUSF向AMF请求一个随机数,AMF生成RAND-AUSF,并将生成的RAND-ausf发送给AUSF,本申请实施例对AUSF是如何获取RAND-ausf的不作限定。The AUSF obtains the random number RAND-ausf, which may include the following methods: AUSF may generate RAND-ausf by itself; or AUSF may request a random number from UDM, UDM generates RAND-ausf, and sends RAND-ausf to AUSF; or The AUSF requests a random number from the AMF, and the AMF generates a RAND-AUSF, and sends the generated RAND-ausf to the AUSF. The embodiment of the present application does not limit how the AUSF obtains the RAND-ausf.

S605,AUSF向NG-RG发送第一消息,所述第一消息中携带RAND-ausf,该第一消息用于向NG-RG请求需要对NG-RG进行认证。可选的,所述第一消息携带AUSF确定的对NG-RG进行认证时所采用的认证方法。S605, the AUSF sends a first message to the NG-RG, where the first message carries RAND-ausf, and the first message is used to request the NG-RG to authenticate the NG-RG. Optionally, the first message carries an authentication method used by the AUSF to authenticate the NG-RG.

例如,假设S603中确定EAP-MSchapv2为对NG-RG进行认证时所采用的认证方法,则该第一消息中可以是EAP-MschapV2挑战消息,该EAP-MschapV2挑战消息表示AUSF选择了EAP-MSchapv2为对NG-RG进行认证的认证方法。For example, if it is determined in S603 that EAP-MSchapv2 is an authentication method used for authenticating NG-RG, the first message may be an EAP-MschapV2 challenge message indicating that the AUSF has selected EAP-MSchapv2. An authentication method for authenticating NG-RG.

S606,NG-RG接收AUSF发送的第一消息,在所述第一消息中获取RAND-ausf。进一步的,可以根据NG-RG的ID、NG-RG的注册密码以及获取到的RAND-ausf确定第一哈希值,例如,计算方法可以参见RFC《draft-kamath-pppext-eap-mschapv2-02》,可选的,第一哈希值可以是前述的第三验证值。S606. The NG-RG receives the first message sent by the AUSF, and acquires RAND-ausf in the first message. Further, the first hash value may be determined according to the ID of the NG-RG, the registration password of the NG-RG, and the obtained RAND-ausf. For example, the calculation method can be referred to RFC "draft-kamath-pppext-eap-mschapv2-02". Optionally, the first hash value may be the foregoing third verification value.

S607,NG-RG生成随机数RAND-rg,例如,RAND-rg可以是前述的第二随机数。S607, NG-RG generates a random number RAND-rg. For example, RAND-rg may be the aforementioned second random number.

S608,NG-RG向AUSF发送第二消息,所述第二消息携带RAND-rg和第一哈希值,假设S603中确定EAP-MSchapv2为对NG-RG进行认证时所采用的认证方法,则第二消息携带EAP-MschapV2-Response消息。例如,该第二消息可以是第一消息的响应消息,第二消息的用于表示NG-RG接受AUSF的认证。S608, the NG-RG sends a second message to the AUSF, where the second message carries the RAND-rg and the first hash value. If the SAP determines that the EAP-MSchapv2 is the authentication method used for authenticating the NG-RG, The second message carries the EAP-MschapV2-Response message. For example, the second message may be a response message of the first message, and the second message is used to indicate that the NG-RG accepts the authentication of the AUSF.

S609,AUSF接收NG-RG发送的第二消息,在第二消息中获取RAND-rg和第一哈希值。AUSF向UDM发送第四消息,该第四消息中携带NG-RG的ID、RAND-rg和RAND-ausf,第四消息用于向UDM请求对NG-RG进行认证所需要的参数。S609. The AUSF receives the second message sent by the NG-RG, and obtains the RAND-rg and the first hash value in the second message. The AUSF sends a fourth message to the UDM, where the fourth message carries the ID of the NG-RG, RAND-rg and RAND-ausf, and the fourth message is used to request the UDM for the parameters required for authenticating the NG-RG.

S610,UDM接收AUSF发送的第四消息,在第四消息中获取NG-RG的ID、RAND-rg和RAND-ausf。进一步的,UDM根据NG-RG的ID、RAND-rg、RAND-ausf以及UDM保存的NG-RG的注册密码确定第二哈希值和第三哈希值,例如,第二哈希值可以是前述 的第一验证值,第三哈希值可以是前述的第二验证值。S610. The UDM receives the fourth message sent by the AUSF, and obtains the ID, RAND-rg, and RAND-ausf of the NG-RG in the fourth message. Further, the UDM determines the second hash value and the third hash value according to the ID of the NG-RG, the RAND-rg, the RAND-ausf, and the registration password of the NG-RG saved by the UDM. For example, the second hash value may be The foregoing first verification value, the third hash value may be the foregoing second verification value.

具体地,所述UDM利用NG-RG的ID、RAND-ausf以及UDM保存的NG-RG的注册密码确定第二哈希值;所述UDM利用NG-RG的ID、RAND-rg以及UDM保存的NG-RG的注册密码确定第三哈希值。Specifically, the UDM determines a second hash value by using an ID of NG-RG, RAND-ausf, and a registration password of the NG-RG saved by the UDM; the UDM is saved by using the ID of NG-RG, RAND-rg, and UDM The registration password of the NG-RG determines the third hash value.

S611,UDM向AUSF发送第五消息,所述第五消息用于向AUSF发送对NG-RG进行认证所需要的参数。S611. The UDM sends a fifth message to the AUSF, where the fifth message is used to send a parameter required for authenticating the NG-RG to the AUSF.

具体的,第五消息中携带S610中确定的第二哈希值和第三哈希值。Specifically, the fifth message carries the second hash value and the third hash value determined in S610.

S612,AUSF接收UDM发送的第五消息,在第五消息中获取第二哈希值和第三哈希值。进一步的,AUSF利用第二哈希值以及S609中获取得到的第一哈希值对NG-RG的合法性进行验证,若第一哈希值等于第二哈希值,则AUSF确定NG-RG合法。若第一哈希值不等于第二哈希值,则AUSF确定NG-RG不合法。S612. The AUSF receives the fifth message sent by the UDM, and obtains the second hash value and the third hash value in the fifth message. Further, the AUSF verifies the legality of the NG-RG by using the second hash value and the first hash value obtained in S609. If the first hash value is equal to the second hash value, the AUSF determines the NG-RG. legitimate. If the first hash value is not equal to the second hash value, the AUSF determines that the NG-RG is invalid.

S613,AUSF向NG-RG发送第三消息,该第三消息中携带第三哈希值,例如,该第三消息用于向NG-RG请求对AUSF进行认证。S613. The AUSF sends a third message to the NG-RG, where the third message carries a third hash value. For example, the third message is used to request the NG-RG to authenticate the AUSF.

S614,NG-RG接收AUSF发送的第三消息,在第三消息中获取第三哈希值。S614. The NG-RG receives the third message sent by the AUSF, and obtains the third hash value in the third message.

进一步的,NG-RG利用NG-RG的ID、RAND-rg以及自身的注册密码确定第四哈希值。Further, the NG-RG determines the fourth hash value using the ID of the NG-RG, RAND-rg, and its own registration password.

可选的,NG-RG确定第四哈希值可以在NG-RG接收到AUSF发送的第三消息之前或之后,本申请实施例对此不作限定。Optionally, the NG-RG determines that the fourth hash value may be used before or after the NG-RG receives the third message sent by the AUSF, which is not limited by the embodiment of the present application.

S615,NG-RG利用第三哈希值和第四哈希值对AUSF的合法性进行认证。S615. The NG-RG authenticates the legality of the AUSF by using the third hash value and the fourth hash value.

例如,若第三哈希值等于第四哈希值,则NG-RG确定AUSF合法,若第三哈希值不等于第四哈希值,则NG-RG确定AUSF不合法。For example, if the third hash value is equal to the fourth hash value, the NG-RG determines that the AUSF is legal, and if the third hash value is not equal to the fourth hash value, the NG-RG determines that the AUSF is invalid.

S616,NG-RG获取随机数pre-master-key,例如pre-master-key可以是前述的第一随机数。S616, the NG-RG obtains a random number pre-master-key, for example, the pre-master-key may be the foregoing first random number.

可选的,本申请实施例对S616的顺序并不作任何限定,例如,S616可以在S601-S615中任何一个步骤之前。也就是说,S616可以是在NG-RG与AUSF互相认证通过之后生成的,也可以是在NG-RG与AUSF互相认证通过之前生成的。一种可能的实现方式是,NG-RG维护一个用于生成锚点密钥的随机数(即pre-master-key),且该随机数周期性更新。例如,该随机数可以是每隔1小时更新一次。当NG-RG需要生成锚点密钥时,会获取该随机数。Optionally, the embodiment of the present application does not limit the sequence of S616. For example, S616 may precede any step in S601-S615. That is to say, S616 may be generated after the NG-RG and the AUSF mutually authenticate each other, or may be generated before the NG-RG and the AUSF mutually authenticate pass. One possible implementation is that the NG-RG maintains a random number (ie, pre-master-key) for generating an anchor key, and the random number is periodically updated. For example, the random number can be updated every 1 hour. When the NG-RG needs to generate an anchor key, the random number is obtained.

S617,NG-RG根据随机数pre-master-key、RAND-ausf和RAND-rg确定锚点密钥,例如,可以利用哈希算法或PRF算法计算锚点密钥。S617, the NG-RG determines the anchor key according to the random numbers pre-master-key, RAND-ausf, and RAND-rg. For example, the anchor key may be calculated by using a hash algorithm or a PRF algorithm.

可选的,本申请实施例对S617的顺序并不作任何限定,只要在NG-RG获取到三个随机数之后都可以执行,例如S617可以在S607之后,S608之前。可选的,S617可以是NG-RG验证AUSF合法之后执行的。需要说明的是,本申请实施例对于NG-RG生成锚点密钥的具体方法不做限定。Optionally, the embodiment of the present application does not limit the sequence of S617, as long as the NG-RG obtains three random numbers, for example, S617 may be after S607 and before S608. Optionally, S617 may be performed after the NG-RG verifies that the AUSF is legal. It should be noted that the specific method for generating an anchor key for the NG-RG is not limited in this embodiment of the present application.

S618,NG-RG利用S601中的第一密钥对随机数pre-master-key进行加密,得到加密后的pre-master-key,可以将加密后的pre-master-key称为pre-master-secret。S618, the NG-RG encrypts the random number pre-master-key by using the first key in S601 to obtain an encrypted pre-master-key, and the encrypted pre-master-key may be referred to as a pre-master- Secret.

将用于生成锚点密钥的随机数先加密再传输,可以有效的保障该用于生成锚点密钥的随机数在传输过程中不外泄。The random number used to generate the anchor key is encrypted and transmitted first, which can effectively ensure that the random number used to generate the anchor key is not leaked during transmission.

S619,NG-RG向AUSF发送第六消息,该第六消息携带pre-master-secret。S619. The NG-RG sends a sixth message to the AUSF, where the sixth message carries a pre-master-secret.

可选的,该第六消息还用于表示NG-RG对AUSF认证通过。当然,该第六消息该可以是方法200中的S214中的验证通过消息。Optionally, the sixth message is further used to indicate that the NG-RG passes the AUSF authentication. Of course, the sixth message may be the verification pass message in S214 in method 200.

S620,AUSF接收NG-RG发送的第六消息,在第六消息中获取pre-master-secret,利用S601中的第二密钥对pre-master-secret进行解密,得到pre-master-key。S620: The AUSF receives the sixth message sent by the NG-RG, obtains the pre-master-secret in the sixth message, and decrypts the pre-master-secret by using the second key in S601 to obtain a pre-master-key.

具体地,认证服务器需要同时为多个NG-RG提供服务,因此,认证服务器上可以保存不同NG-RG对应的密钥,当认证服务器接收到pre-master-secret之后,认证服务器可以根据该NG-RG的标识在自身保存的多个密钥中确定对加密后的第一随机数进行解密的第二密钥,从而利用第二密钥对pre-master-secret进的解密得到pre-master-key。Specifically, the authentication server needs to provide services for multiple NG-RGs at the same time. Therefore, the authentication server can store keys corresponding to different NG-RGs. After the authentication server receives the pre-master-secret, the authentication server can perform the NG according to the NG. The identifier of the -RG determines a second key for decrypting the encrypted first random number among the plurality of keys stored by itself, thereby decrypting the pre-master-secret with the second key to obtain a pre-master- Key.

S621,AUSF利用S620得到的pre-master-key、RAND-ausf和RAND-rg确定锚点密钥。S621, the AUSF determines the anchor key using the pre-master-key, RAND-ausf, and RAND-rg obtained by S620.

S622,AUSF将锚点密钥发送给AMF设备,AMF根据锚点密钥与NG-RG进行通信,例如,可以进行控制面数据和用户面数据的通信。S622, the AUSF sends the anchor key to the AMF device, and the AMF communicates with the NG-RG according to the anchor key. For example, communication between the control plane data and the user plane data can be performed.

应理解,方法600中各个步骤的执行顺序并不是唯一确定的,具体各个步骤的顺序可以根据逻辑关系确定。It should be understood that the order of execution of the various steps in method 600 is not uniquely determined, and the order of the various steps may be determined in accordance with the logical relationship.

可选的,在S601中,NG-RG确定的第一密钥和,AUSF确定的第二密钥,第一密钥和第二密钥可以是一对对称密钥,例如,根据DH算法得到的一对密钥。如图8所述为确定第一密钥和第二密钥的过程,包括以下步骤:Optionally, in S601, the first key determined by the NG-RG and the second key determined by the AUSF, the first key and the second key may be a pair of symmetric keys, for example, according to the DH algorithm. a pair of keys. As shown in FIG. 8, the process of determining the first key and the second key includes the following steps:

S701,在S601中NG-RG向AUSF发送的注册消息中可以携带DH的支持的能力集,DH支持的能力集中包括用于生成密钥的一些公共参数,例如,这些公共参数可以是多个素数和多个原根。S701, in S601, the registration message sent by the NG-RG to the AUSF may carry the supported capability set of the DH, and the capability set supported by the DH includes some common parameters used to generate the key, for example, the common parameters may be multiple prime numbers. And multiple original roots.

S702,AUSF接收NG-RG发送的注册消息,并在注册消息中获取DH的支持的能力集,AUSF在DH支持的能力集中确定“选择的DH能力”以及NG-RG“发起的DH能力”,AUSF根据“选择的DH能力”以及NG-RG“发起的DH能力”生成DH的第一参数AUSF-priv和第二参数AUSF-pub。S702: The AUSF receives the registration message sent by the NG-RG, and obtains the capability set supported by the DH in the registration message, and the AUSF determines the “selected DH capability” and the NG-RG “initiated DH capability” in the capability set supported by the DH. The AUSF generates a first parameter AUSF-priv and a second parameter AUSF-pub of the DH according to the "selected DH capability" and the NG-RG "initiated DH capability".

S703,AUSF将第二参数AUSF-pub以及“选择的DH能力”以及NG-RG“发起的DH能力”通过S605中的第一消息向NG-RG发送。S703. The AUSF sends the second parameter AUSF-pub and the "selected DH capability" and the NG-RG "initiated DH capability" to the NG-RG through the first message in S605.

S704,NG-RG接收AUSF发送的第一消息,并且在第一消息中获取AUSF选择的素数和原根以及第二参数AUSF-pub,NG-RG根据AUSF选择的素数和原根生成DH的第三参数RG-priv和第四参数RG-pub。S704, the NG-RG receives the first message sent by the AUSF, and obtains the prime number and the original root selected by the AUSF and the second parameter AUSF-pub in the first message, and the NG-RG generates the DH according to the prime number selected by the AUSF and the original root. The three parameters RG-priv and the fourth parameter RG-pub.

S705,NG-RG根据第三参数RG-priv和第二参数AUSF-pub生成第一密钥。S705. The NG-RG generates a first key according to the third parameter RG-priv and the second parameter AUSF-pub.

S706,NG-RG可以将第四参数RG-pub通过S608中的第二消息向AUSF发送。S706. The NG-RG may send the fourth parameter RG-pub to the AUSF by using the second message in S608.

S707,AUSF根据第四参数RG-pub和第一参数AUSF-priv生成第二密钥,所述第二密钥与所述第一密钥相同。这样,在S618中,可以NG-RG可以利用第一密钥对第一随机数进行加密,在S620中,AUSF可以利用第二密钥对加密后的第一随机数进行解密,得到第一随机数。S707. The AUSF generates a second key according to the fourth parameter RG-pub and the first parameter AUSF-priv, where the second key is the same as the first key. Thus, in S618, the NG-RG may encrypt the first random number by using the first key, and in S620, the AUSF may decrypt the encrypted first random number by using the second key to obtain the first random number. number.

上文中结合图1至图8,详细描述了根据本申请实施例的通信方法,下面将结合图9至图15,详细描述根据本申请实施例的通信装置。The communication method according to the embodiment of the present application is described in detail above with reference to FIG. 1 to FIG. 8. The communication device according to the embodiment of the present application will be described in detail below with reference to FIG. 9 to FIG.

图9示出了本申请实施例提供的通信装置800,该装置800包括:FIG. 9 shows a communication device 800 provided by an embodiment of the present application. The device 800 includes:

收发单元810,用于接收来自终端的加密后的第一随机数;The transceiver unit 810 is configured to receive the encrypted first random number from the terminal;

处理单元820,用于根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥;The processing unit 820 is configured to determine, according to the encrypted first random number, the second random number, and the third random number, an anchor key;

所述收发单元810还用于向移动性管理设备发送所述锚点密钥。The transceiver unit 810 is further configured to send the anchor key to the mobility management device.

作为一个可选实施例,所述锚点密钥用于所述移动性管理设备进行通信。As an alternative embodiment, the anchor key is used by the mobility management device to communicate.

作为一个可选实施例,所述第二随机数由终端生成,所述第三随机数由所述装置生成或者由所述移动性管理设备生成或者由数据管理设备生成。As an optional embodiment, the second random number is generated by a terminal, the third random number being generated by the device or generated by the mobility management device or generated by a data management device.

作为一个可选实施例,所述收发单元810还用于:从数据管理设备获取第一验证值和第二验证值;所述处理单元还用于根据所述第一验证值对所述终端进行认证;所述收发单元还用于在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。As an optional embodiment, the transceiver unit 810 is further configured to: acquire a first verification value and a second verification value from the data management device; the processing unit is further configured to perform, according to the first verification value, the terminal The transceiver unit is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal.

作为一个可选实施例,所述收发单元810还用于:向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。As an optional embodiment, the transceiver unit 810 is further configured to: send the terminal identifier of the terminal, the second random number, and the third random number to the data management device; receive the data management from the terminal The first verification value and the second verification value of the device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and the third random number Determining; the second verification value is determined by the terminal identifier, a registration password of the terminal saved by the data management device, and the second random number.

作为一个可选实施例,所述收发单元810还用于:接收所述终端发送的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;所述处理单元820具体用于:若所述第一验证值等于所述第三验证值,则确定所述终端合法。As an optional embodiment, the transceiver unit 810 is further configured to: receive a third verification value sent by the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and The processing unit 820 is configured to determine that the terminal is legal if the first verification value is equal to the third verification value.

作为一个可选实施例,所述收发单元810还用于:在从数据管理设备获取第一验证值和第二验证值之前,接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法;所述处理单元820还用于:根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法。As an optional embodiment, the transceiver unit 810 is further configured to: before receiving the first verification value and the second verification value from the data management device, receive one or two of the terminal support from the terminal, and The above-mentioned authentication method is further configured to: determine, according to one or two or more authentication methods supported by the terminal, and an authentication method supported by the authentication server, determine the authentication used by the terminal The first method of authentication.

作为一个可选实施例,所述收发单元810还用于:接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每种认证方法的优先级;As an optional embodiment, the transceiver unit 810 is further configured to: receive one or two or more authentication methods supported by the terminal from the terminal, and the one or two or more authentication methods. The priority of each authentication method;

所述处理单元820具体用于:根据所述终端支持的一种或者两种及以上的认证方法中每种认证方法的优先级以及所述认证服务器支持的认证方法,确定所述第一认证方法。The processing unit 820 is specifically configured to: determine the first authentication method according to a priority of each of the one or two or more authentication methods supported by the terminal, and an authentication method supported by the authentication server. .

作为一个可选实施例,所述加密后的第一随机数是利用第一密钥加密第一随机数得到的;所述处理单元820具体用于:利用第二密钥对所述加密后的第一随机数进行解密,得到所述第一随机数,其中,所述第二密钥为与所述第一密钥对应的密钥;利用所述第一随机数、第二随机数和第三随机数,确定所述锚点密钥。As an optional embodiment, the encrypted first random number is obtained by encrypting the first random number by using the first key; the processing unit 820 is specifically configured to: use the second key to pair the encrypted Decrypting the first random number to obtain the first random number, wherein the second key is a key corresponding to the first key; using the first random number, the second random number, and the first The three random numbers determine the anchor key.

作为一个可选实施例,所述第一密钥和所述第二密钥为根据迪菲-赫尔曼DH算法生成的一对密钥。As an optional embodiment, the first key and the second key are a pair of keys generated according to a Diffie-Hellmann DH algorithm.

应理解,这里的装置800以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置800可以具体为上述方法实施例中的认证服务器,装置80可以用于执行 上述方法实施例中与认证服务器对应的各个流程和/或步骤,为避免重复,在此不再赘述。It should be understood that the apparatus 800 herein is embodied in the form of a functional unit. The term "unit" as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality. In an optional example, those skilled in the art may understand that the device 800 may be specifically an authentication server in the foregoing method embodiment, and the device 80 may be used to execute various processes and/or steps corresponding to the authentication server in the foregoing method embodiment. To avoid repetition, we will not repeat them here.

图10示出了本申请实施例提供的通信装置900,该装置900包括:FIG. 10 shows a communication device 900 provided by an embodiment of the present application. The device 900 includes:

处理单元910,用于生成第一随机数;The processing unit 910 is configured to generate a first random number.

所述处理单元910还用于根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。The processing unit 910 is further configured to determine, according to the first random number, the second random number, and the third random number, an anchor key, where the anchor key is used for the terminal communication.

作为一个可选实施例,所述处理单元还用于:对所述第一随机数进行加密,得到加密后的第一随机数;所述装置还包括:第一收发单元920,用于向认证服务器发送所述加密后的第一随机数。As an optional embodiment, the processing unit is further configured to: encrypt the first random number to obtain an encrypted first random number; and the device further includes: a first transceiver unit 920, configured to authenticate The server sends the encrypted first random number.

作为一个可选实施例,所述第二随机数由所述装置生成,所述第三随机数由所述认证服务器或移动性管理设备或者数据管理设备生成。As an optional embodiment, the second random number is generated by the apparatus, and the third random number is generated by the authentication server or a mobility management device or a data management device.

作为一个可选实施例,所述装置还包括:第二收发单元,用于接收所述数据管理设备通过所述认证服务器发送的第二验证值,所述第二验证值由所述装置的装置标识、所述数据管理设备保存的所述装置的注册密码以及所述第二随机数确定的。In an optional embodiment, the apparatus further includes: a second transceiver unit, configured to receive a second verification value sent by the data management device by the authentication server, where the second verification value is used by the device of the device The identifier, the registration password of the device saved by the data management device, and the second random number determined.

所述处理单元还用于:根据所述装置端标识、所述装置保存的自身的注册密码以及所述第二随机数确定第四验证值;根据所述第二验证值和所述第四验证值对认证服务器进行认证。The processing unit is further configured to: determine a fourth verification value according to the device end identifier, the registration password saved by the device, and the second random number; according to the second verification value and the fourth verification The value authenticates the authentication server.

作为一个可选实施例,所述装置还包括:第三收发单元,用于所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法。As an optional embodiment, the device further includes: a third transceiver unit, configured to send, by the authentication server, one or two or more authentication methods supported by the terminal.

作为一个可选实施例,所述第三收发单元具体用于:向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每种认证方法的优先级。As an optional embodiment, the third transceiver unit is specifically configured to: send, to the authentication server, one or two or more authentication methods supported by the terminal, and the one or two or more authentications. The priority of each authentication method in the method.

应理解,这里的装置900以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置900可以具体为上述方法实施例中的终端,装置900可以用于执行上述方法实施例中与终端对应的各个流程和/或步骤,为避免重复,在此不再赘述。It should be understood that the apparatus 900 herein is embodied in the form of a functional unit. The term "unit" as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality. In an alternative example, those skilled in the art may understand that the device 900 may be specifically the terminal in the foregoing method embodiment, and the device 900 may be used to perform various processes and/or steps corresponding to the terminal in the foregoing method embodiment. Avoid repetition and we will not repeat them here.

图11示出了本申请实施例提供的通信装置1000,该装置1000包括:FIG. 11 shows a communication device 1000 provided by an embodiment of the present application. The device 1000 includes:

收发单元1010,用于从数据管理设备获取第一验证值和第二验证值;The transceiver unit 1010 is configured to obtain a first verification value and a second verification value from the data management device.

处理单元1020,用于根据所述第一验证值对所述终端进行认证;The processing unit 1020 is configured to perform authentication on the terminal according to the first verification value.

所述收发单元1010还用于在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。The transceiver unit 1010 is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal.

作为一个可选实施例,所述收发单元1010还用于:向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定,所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。As an optional embodiment, the transceiver unit 1010 is further configured to: send the terminal identifier of the terminal, the second random number, and the third random number to the data management device; receive the data management from the terminal The first verification value and the second verification value of the device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and the third random number It is determined that the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number.

作为一个可选实施例,所述收发单元1010还用于:接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册 密码确定的。As an optional embodiment, the transceiver unit 1010 is further configured to: receive a third verification value from the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and The terminal's own registered password is determined.

所述处理单元1020还用于:若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法;若所述第一验证值不等于所述第三验证值,则所述认证服务器确定所述终端不合法。The processing unit 1020 is further configured to: if the first verification value is equal to the third verification value, the authentication server determines that the terminal is legal; if the first verification value is not equal to the third verification value And the authentication server determines that the terminal is illegal.

应理解,这里的装置1000以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置1000可以具体为上述方法实施例中的认证服务器,装置1000可以用于执行上述方法实施例中与认证服务器对应的各个流程和/或步骤,为避免重复,在此不再赘述。It should be understood that the apparatus 1000 herein is embodied in the form of a functional unit. The term "unit" as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality. In an optional example, those skilled in the art may understand that the device 1000 may be specifically an authentication server in the foregoing method embodiment, and the device 1000 may be used to execute various processes and/or steps corresponding to the authentication server in the foregoing method embodiment. To avoid repetition, we will not repeat them here.

图12示出了本申请实施例提供的通信系统1100,该系统1100包括:装置800和装置900。FIG. 12 shows a communication system 1100 provided by an embodiment of the present application. The system 1100 includes: a device 800 and a device 900.

上述装置800与方法实施例中的认证服务器完全对应,上述装置900与方法实施例中终端完全对应,上述装置1000与方法实施例中的数据管理设备完全对应,由相应的单元执行相应的步骤,例如收发单元方法执行方法实施例中收发步骤,除收发外的其它步骤可以由处理模块执行。具体模块的功能可以参考相应的方法实施例,不再详述。The device 800 is completely corresponding to the authentication server in the method embodiment, and the device 900 completely corresponds to the terminal in the method embodiment. The device 1000 completely corresponds to the data management device in the method embodiment, and the corresponding unit performs the corresponding steps. For example, the transceiver unit method performs the transceiving step in the method embodiment, and the steps other than transceiving may be performed by the processing module. For the function of the specific module, reference may be made to the corresponding method embodiment, which is not described in detail.

上述各个方案的认证服务器、终端及数据管理设备具有实现上述方法中认证服务器、终端及数据管理设备执行的相应步骤的功能;所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块;例如发送单元可以由发射机替代,接收单元可以由接收机替代,其它单元,如确定单元等可以由处理器替代,分别执行各个方法实施例中的收发操作以及相关的处理操作。The authentication server, the terminal, and the data management device of the foregoing solutions have the functions of implementing the corresponding steps performed by the authentication server, the terminal, and the data management device in the foregoing method; the functions may be implemented by hardware or by executing corresponding software through hardware. The hardware or software includes one or more modules corresponding to the above functions; for example, the transmitting unit may be replaced by a transmitter, the receiving unit may be replaced by a receiver, and other units such as a determining unit may be replaced by a processor and executed separately Transceiver operations and associated processing operations in various method embodiments.

在本申请的实施例,图9-11中的装置也可以是芯片或者芯片系统,例如:片上系统(System on Chip,SoC)。对应的,接收单元和发送单元可以是该芯片的收发电路,在此不做限定。In the embodiment of the present application, the device in FIG. 9-11 may also be a chip or a chip system, for example, a system on chip (SoC). Correspondingly, the receiving unit and the sending unit may be transceiver circuits of the chip, which are not limited herein.

图13示出了本申请实施例提供的又一通信装置1200。该装置1200包括处理器1210、收发器1220和存储器1230。其中,处理器1210、收发器1220和存储器1230通过内部连接通路互相通信,该存储器1230用于存储指令,该处理器1210用于执行该存储器1230存储的指令,以控制该收发器1220发送信号和/或接收信号。FIG. 13 shows still another communication device 1200 provided by an embodiment of the present application. The apparatus 1200 includes a processor 1210, a transceiver 1220, and a memory 1230. The processor 1210, the transceiver 1220, and the memory 1230 communicate with each other through an internal connection path. The memory 1230 is configured to store instructions, and the processor 1210 is configured to execute instructions stored by the memory 1230 to control the transceiver 1220 to send signals and / or receive signals.

其中,收发器1220用于接收来自终端的加密后的第一随机数;处理器1210用于根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥;所述收发器1220还用于向移动性管理设备发送所述锚点密钥。The transceiver 1220 is configured to receive the encrypted first random number from the terminal, and the processor 1210 is configured to determine, according to the encrypted first random number, the second random number, and the third random number, an anchor key. The transceiver 1220 is further configured to send the anchor key to the mobility management device.

可选的,该存储器1230可以为该通信装置1200之外的设备。Optionally, the memory 1230 can be a device other than the communication device 1200.

应理解,装置1200可以具体为上述方法实施例中的认证服务器,并且可以用于执行上述方法实施例中终端对应的各个步骤和/或流程。可选的,该存储器1230可以包括只读存储器和随机存取存储器,并向处理器提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器。例如,存储器还可以存储设备类型的信息。该处理器1210可以用于执行存储器中存储的指令,并且当该处理器1210执行存储器中存储的指令时,该处理器1110用于执行上述与该认证服务器对应的方法实施例的各个步骤和/或流程。It should be understood that the device 1200 may be specifically an authentication server in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the terminal in the foregoing method embodiment. Optionally, the memory 1230 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory. For example, the memory can also store information of the device type. The processor 1210 can be configured to execute instructions stored in a memory, and when the processor 1210 executes instructions stored in the memory, the processor 1110 is configured to perform the various steps of the method embodiment corresponding to the authentication server described above and/or Or process.

图14示出了本申请实施例提供的又一通信装置1300。该装置1300包括处理器1310、收发器1320和存储器1330。其中,处理器1310、收发器1320和存储器1330通过内部连接通路互相通信,该存储器1330用于存储指令,该处理器1310用于执行该存储器1330存储的指令,以控制该收发器1320发送信号和/或接收信号。FIG. 14 shows still another communication device 1300 provided by an embodiment of the present application. The apparatus 1300 includes a processor 1310, a transceiver 1320, and a memory 1330. The processor 1310, the transceiver 1320, and the memory 1330 communicate with each other through an internal connection path. The memory 1330 is configured to store instructions, and the processor 1310 is configured to execute instructions stored by the memory 1330 to control the transceiver 1320 to send signals and / or receive signals.

其中,处理器1310用于生成第一随机数;根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。The processor 1310 is configured to generate a first random number, and determine an anchor key according to the first random number, the second random number, and the third random number, where the anchor key is used for the terminal communication.

可选的,该存储器1330可以为该通信装置1300之外的设备。Optionally, the memory 1330 can be a device other than the communication device 1300.

应理解,装置1300可以具体为上述方法实施例中的终端,并且可以用于执行上述方法实施例中终端对应的各个步骤和/或流程。可选的,该存储器1330可以包括只读存储器和随机存取存储器,并向处理器提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器。例如,存储器还可以存储设备类型的信息。该处理器1310可以用于执行存储器中存储的指令,并且当该处理器1310执行存储器中存储的指令时,该处理器1310用于执行上述与该终端对应的方法实施例的各个步骤和/或流程。It should be understood that the device 1300 may be specifically the terminal in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the terminal in the foregoing method embodiment. Optionally, the memory 1330 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory. For example, the memory can also store information of the device type. The processor 1310 can be configured to execute instructions stored in a memory, and when the processor 1310 executes instructions stored in the memory, the processor 1310 is configured to perform the various steps of the method embodiments corresponding to the terminal described above and/or Process.

图15示出了本申请实施例提供的又一通信装置1400。该装置1400包括处理器1410、收发器1420和存储器1430。其中,处理器1410、收发器1420和存储器1330通过内部连接通路互相通信,该存储器1430用于存储指令,该处理器1410用于执行该存储器1430存储的指令,以控制该收发器1420发送信号和/或接收信号。FIG. 15 shows still another communication device 1400 provided by an embodiment of the present application. The apparatus 1400 includes a processor 1410, a transceiver 1420, and a memory 1430. The processor 1410, the transceiver 1420, and the memory 1330 communicate with each other through an internal connection path. The memory 1430 is configured to store instructions, and the processor 1410 is configured to execute instructions stored by the memory 1430 to control the transceiver 1420 to send signals and / or receive signals.

其中,收发器1420用于从数据管理设备获取第一验证值和第二验证值;处理器1410用于根据所述第一验证值对所述终端进行认证;所述收发器1320还用于在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。The transceiver 1420 is configured to obtain a first verification value and a second verification value from the data management device. The processor 1410 is configured to authenticate the terminal according to the first verification value. The transceiver 1320 is further configured to When the result of the terminal authentication is legal, the second verification value is sent to the terminal.

可选的,该存储器1430可以为该通信装置1400之外的设备。Alternatively, the memory 1430 can be a device other than the communication device 1400.

应理解,装置1400可以具体为上述方法实施例中的数据管理设备,并且可以用于执行上述方法实施例中数据管理设备对应的各个步骤和/或流程。可选的,该存储器1430可以包括只读存储器和随机存取存储器,并向处理器提供指令和数据。存储器的一部分还可以包括非易失性随机存取存储器。例如,存储器还可以存储设备类型的信息。该处理器1410可以用于执行存储器中存储的指令,并且当该处理器1310执行存储器中存储的指令时,该处理器1410用于执行上述与该数据管理设备对应的方法实施例的各个步骤和/或流程。It should be understood that the device 1400 may be specifically the data management device in the foregoing method embodiment, and may be used to perform various steps and/or processes corresponding to the data management device in the foregoing method embodiment. Optionally, the memory 1430 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory may also include a non-volatile random access memory. For example, the memory can also store information of the device type. The processor 1410 can be configured to execute instructions stored in a memory, and when the processor 1310 executes instructions stored in the memory, the processor 1410 is configured to perform the various steps of the method embodiment corresponding to the data management device described above and / or process.

应理解,上述的收发器可以包括发射机和接收机。收发器还可以进一步包括天线,天线的数量可以为一个或多个。存储器可以是一个单独的器件,也可以集成在处理器中。上述的各个器件或部分器件可以集成到芯片中实现,如集成到基带芯片中实现。It should be understood that the transceiver described above can include a transmitter and a receiver. The transceiver may further include an antenna, and the number of antennas may be one or more. The memory can be a separate device or integrated into the processor. The above various devices or parts of the device can be integrated into the chip for implementation, such as integration into a baseband chip.

在本申请的实施例,图13-图15中的收发器也可以是通信接口,在此不做限定。In the embodiment of the present application, the transceiver in FIG. 13 to FIG. 15 may also be a communication interface, which is not limited herein.

在本申请的各实施例中,为了方面理解,进行了多种举例说明。然而,这些例子仅仅是一些举例,并不意味着是实现本申请的最佳实现方式。In the various embodiments of the present application, various examples are set forth for the purposes of understanding. However, these examples are merely examples and are not meant to be the best implementation of the present application.

也应理解,在本申请实施例中,上述装置的处理器可以是中央处理单元(central processing unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field-programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是 任何常规的处理器等。It should also be understood that, in the embodiment of the present application, the processor of the foregoing device may be a central processing unit (CPU), and the processor may also be another general-purpose processor, a digital signal processor (DSP). ), application specific integrated circuit (ASIC), field-programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like.

在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器执行存储器中的指令,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software. The steps of the method disclosed in the embodiments of the present application may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software units in the processor. The software unit can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like. The storage medium is located in a memory, and the processor executes instructions in the memory, in combination with hardware to perform the steps of the above method. To avoid repetition, it will not be described in detail here.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The available media can be magnetic media (eg, a floppy disk, a hard disk, Magnetic tape), optical medium (for example, DVD), or semiconductor medium (such as solid state disk (SSD)).

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.

在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.

所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现 有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The foregoing is only a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present application. It should be covered by the scope of protection of this application. Therefore, the scope of protection of the present application should be determined by the scope of the claims.

Claims (38)

一种通信方法,其特征在于,包括:A communication method, comprising: 认证服务器接收来自终端的加密后的第一随机数;The authentication server receives the encrypted first random number from the terminal; 所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥;Determining, by the authentication server, an anchor key according to the encrypted first random number, the second random number, and the third random number; 所述认证服务器向移动性管理设备发送所述锚点密钥。The authentication server sends the anchor key to the mobility management device. 根据权利要求1所述的方法,其特征在于,所述锚点密钥用于所述移动性管理设备进行通信。The method of claim 1 wherein said anchor key is used by said mobility management device to communicate. 根据权利要求1或2所述的方法,其特征在于,所述第二随机数由所述终端生成,所述第三随机数由所述认证服务器生成或者由所述移动性管理设备生成或者由数据管理设备生成。The method according to claim 1 or 2, wherein the second random number is generated by the terminal, and the third random number is generated by the authentication server or generated by the mobility management device or by Data management device generation. 根据权利要求1至3中任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 3, wherein the method further comprises: 所述认证服务器从数据管理设备获取第一验证值和第二验证值;The authentication server acquires a first verification value and a second verification value from the data management device; 所述认证服务器根据所述第一验证值对所述终端进行认证;The authentication server authenticates the terminal according to the first verification value; 所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。The authentication server sends the second verification value to the terminal if the result of authenticating the terminal is legal. 根据权利要求4所述的方法,其特征在于,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体包括:The method according to claim 4, wherein the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, specifically includes: 所述认证服务器向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;Sending, by the authentication server, the terminal identifier, the second random number, and the third random number of the terminal to the data management device; 所述认证服务器接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。The authentication server receives the first verification value and the second verification value from the data management device, wherein the first verification value is identified by the terminal, and the terminal saved by the data management device The registration password and the third random number are determined; the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number. 根据权利要求4或5所述的方法,其特征在于,所述方法还包括:The method according to claim 4 or 5, wherein the method further comprises: 所述认证服务器接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;The authentication server receives a third verification value from the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and a registration password saved by the terminal; 其中,所述认证服务器根据所述第一验证值对所述终端进行认证,包括:The authentication server performs authentication on the terminal according to the first verification value, and includes: 若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法。And if the first verification value is equal to the third verification value, the authentication server determines that the terminal is legal. 根据权利要求4至6中任一项所述的方法,其特征在于,在所述认证服务器从数据管理设备获取第一验证值和第二验证值之前,所述方法还包括:The method according to any one of claims 4 to 6, wherein before the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, the method further comprises: 所述认证服务器接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法;The authentication server receives one or two or more authentication methods supported by the terminal from the terminal; 所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法。The authentication server determines, according to one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server, a first authentication method used to perform authentication on the terminal. 根据权利要求7所述的方法,其特征在于,所述认证服务器接收所述终端发送的所述终端支持的一种或者两种及以上的认证方法,包括:The method according to claim 7, wherein the authentication server receives one or two or more authentication methods supported by the terminal and sent by the terminal, including: 所述认证服务器接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每种认证方法的优先级;The authentication server receives one or two or more authentication methods supported by the terminal from the terminal and a priority of each of the one or two or more authentication methods; 其中,所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法,包括:The first authentication method used by the authentication server to determine the authentication of the terminal according to the one or two or more authentication methods supported by the terminal and the authentication method supported by the authentication server includes: 所述认证服务器根据所述终端支持的一种或者两种及以上的认证方法中每种认证方法的优先级以及所述认证服务器支持的认证方法,确定所述第一认证方法。The authentication server determines the first authentication method according to a priority of each of the one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server. 根据权利要求1至8中任一项所述的方法,其特征在于,所述加密后的第一随机数是利用第一密钥加密第一随机数得到的;The method according to any one of claims 1 to 8, wherein the encrypted first random number is obtained by encrypting the first random number with the first key; 所述认证服务器根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥,包括:Determining, by the authentication server, the anchor key according to the encrypted first random number, the second random number, and the third random number, including: 所述认证服务器利用第二密钥对所述加密后的第一随机数进行解密,得到所述第一随机数,其中,所述第二密钥为与所述第一密钥对应的密钥;The authentication server decrypts the encrypted first random number by using a second key to obtain the first random number, where the second key is a key corresponding to the first key ; 所述认证服务器利用所述第一随机数、第二随机数和第三随机数,确定所述锚点密钥。The authentication server determines the anchor key by using the first random number, the second random number, and the third random number. 根据权利要求9所述的方法,其特征在于,所述第一密钥和所述第二密钥为根据迪菲-赫尔曼DH算法生成的一对密钥。The method of claim 9, wherein the first key and the second key are a pair of keys generated according to a Diffie-Hellmann DH algorithm. 一种通信方法,其特征在于,包括:A communication method, comprising: 终端生成第一随机数;The terminal generates a first random number; 所述终端根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。And determining, by the terminal, an anchor key according to the first random number, the second random number, and the third random number, where the anchor key is used for communication by the terminal. 根据权利要求11所述的方法,其特征在于,所述方法还包括:The method of claim 11 wherein the method further comprises: 所述终端对所述第一随机数进行加密,得到加密后的第一随机数;The terminal encrypts the first random number to obtain an encrypted first random number; 所述终端向认证服务器发送所述加密后的第一随机数。The terminal sends the encrypted first random number to an authentication server. 根据权利要求11或12所述的方法,其特征在于,所述第二随机数由终端生成,所述第三随机数由所述认证服务器或移动性管理设备或者数据管理设备生成。The method according to claim 11 or 12, wherein the second random number is generated by a terminal, and the third random number is generated by the authentication server or a mobility management device or a data management device. 根据权利要求11至13中任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 11 to 13, wherein the method further comprises: 所述终端接收来自数据管理设备的第二验证值,所述第二验证值由所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第二随机数确定的;Receiving, by the terminal, a second verification value from the data management device, where the second verification value is determined by a terminal identifier of the terminal, a registration password of the terminal saved by the data management device, and the second random number ; 所述终端根据所述终端标识、所述终端保存的自身的注册密码以及所述第二随机数确定第四验证值;Determining, by the terminal, a fourth verification value according to the terminal identifier, a registration password saved by the terminal, and the second random number; 所述终端根据所述第二验证值和所述第四验证值对认证服务器进行认证。The terminal authenticates the authentication server according to the second verification value and the fourth verification value. 根据权利要求11至14中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 11 to 14, wherein the method further comprises: 所述终端向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法;或者Transmitting, by the terminal, one or two or more authentication methods supported by the terminal to the authentication server; or 所述终端向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每个认证方法的优先级。The terminal sends, to the authentication server, one or two or more authentication methods supported by the terminal and a priority of each of the one or two or more authentication methods. 一种通信方法,其特征在于,包括:A communication method, comprising: 认证服务器从数据管理设备获取第一验证值和第二验证值;The authentication server acquires the first verification value and the second verification value from the data management device; 所述认证服务器根据所述第一验证值对所述终端进行认证;The authentication server authenticates the terminal according to the first verification value; 所述认证服务器在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二 验证值。The authentication server sends the second verification value to the terminal if the result of authenticating the terminal is legal. 根据权利要求16所述的方法,其特征在于,所述认证服务器从数据管理设备获取第一验证值和第二验证值,具体包括:The method according to claim 16, wherein the obtaining, by the authentication server, the first verification value and the second verification value from the data management device, specifically includes: 所述认证服务器向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;Sending, by the authentication server, the terminal identifier, the second random number, and the third random number of the terminal to the data management device; 所述认证服务器接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。The authentication server receives the first verification value and the second verification value from the data management device, wherein the first verification value is identified by the terminal, and the terminal saved by the data management device The registration password and the third random number are determined; the second verification value is determined by the terminal identifier, the registration password of the terminal saved by the data management device, and the second random number. 根据权利要求16或17所述的方法,其特征在于,所述方法还包括:The method according to claim 16 or 17, wherein the method further comprises: 所述认证服务器接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;The authentication server receives a third verification value from the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and a registration password saved by the terminal; 其中,所述认证服务器根据所述第一验证值对所述终端进行认证,包括:The authentication server performs authentication on the terminal according to the first verification value, and includes: 若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法;And if the first verification value is equal to the third verification value, the authentication server determines that the terminal is legal; 若所述第一验证值不等于所述第三验证值,则所述认证服务器确定所述终端不合法。And if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid. 一种通信装置,其特征在于,包括:A communication device, comprising: 收发单元,用于接收来自终端的加密后的第一随机数;a transceiver unit, configured to receive the encrypted first random number from the terminal; 处理单元,用于根据所述加密后的第一随机数、第二随机数和第三随机数,确定锚点密钥;a processing unit, configured to determine an anchor key according to the encrypted first random number, the second random number, and the third random number; 所述收发单元还用于向移动性管理设备发送所述锚点密钥。The transceiver unit is further configured to send the anchor key to the mobility management device. 根据权利要求19所述的装置,其特征在于,所述第二随机数由终端生成,所述第三随机数由所述装置生成或者由所述移动性管理设备生成或者由数据管理设备生成。The apparatus of claim 19, wherein the second random number is generated by a terminal, the third random number being generated by the apparatus or generated by the mobility management device or generated by a data management device. 根据权利要求19或20所述的装置,其特征在于,所述收发单元还用于:The device according to claim 19 or 20, wherein the transceiver unit is further configured to: 从数据管理设备获取第一验证值和第二验证值;Obtaining a first verification value and a second verification value from the data management device; 所述处理单元还用于根据所述第一验证值对所述终端进行认证;The processing unit is further configured to authenticate the terminal according to the first verification value; 所述收发单元还用于在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。The transceiver unit is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal. 根据权利要求21所述的装置,其特征在于,所述收发单元还用于:The device according to claim 21, wherein the transceiver unit is further configured to: 向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;Transmitting, to the data management device, a terminal identifier of the terminal, the second random number, and the third random number; 接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。Receiving the first verification value and the second verification value from the data management device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and The third random number is determined; the second verification value is determined by the terminal identifier, the registration password of the terminal and the second random number saved by the data management device. 根据权利要求21或22所述的装置,其特征在于,所述收发单元还用于:The device according to claim 21 or 22, wherein the transceiver unit is further configured to: 接收所述终端发送的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;Receiving, by the terminal, a third verification value, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and a registration password saved by the terminal; 所述处理单元具体用于:The processing unit is specifically configured to: 若所述第一验证值等于所述第三验证值,则确定所述终端合法。And if the first verification value is equal to the third verification value, determining that the terminal is legal. 根据权利要求21至23中任一项所述的装置,其特征在于,所述收发单元还用于:The device according to any one of claims 21 to 23, wherein the transceiver unit is further configured to: 在从数据管理设备获取第一验证值和第二验证值之前,接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法;Receiving one or two or more authentication methods supported by the terminal from the terminal before acquiring the first verification value and the second verification value from the data management device; 所述处理单元还用于:根据所述终端支持的一种或者两种及以上的认证方法以及所述认证服务器支持的认证方法,确定对所述终端进行认证所采用的第一认证方法。The processing unit is further configured to: determine, according to one or two or more authentication methods supported by the terminal, and an authentication method supported by the authentication server, a first authentication method used to perform authentication on the terminal. 根据权利要求24所述的装置,其特征在于,所述收发单元具体用于:The device according to claim 24, wherein the transceiver unit is specifically configured to: 接收来自所述终端的所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每种认证方法的优先级;Receiving one or two or more authentication methods supported by the terminal from the terminal and a priority of each of the one or two or more authentication methods; 所述处理单元具体用于:The processing unit is specifically configured to: 根据所述终端支持的一种或者两种及以上的认证方法中每种认证方法的优先级以及所述认证服务器支持的认证方法,确定所述第一认证方法。The first authentication method is determined according to a priority of each of the one or two or more authentication methods supported by the terminal and an authentication method supported by the authentication server. 根据权利要求19至25中任一项所述的装置,其特征在于,所述加密后的第一随机数是利用第一密钥加密第一随机数得到的;The apparatus according to any one of claims 19 to 25, wherein the encrypted first random number is obtained by encrypting the first random number with the first key; 所述处理单元具体用于:The processing unit is specifically configured to: 利用第二密钥对所述加密后的第一随机数进行解密,得到所述第一随机数,其中,所述第二密钥为与所述第一密钥对应的密钥;Decrypting the encrypted first random number by using a second key to obtain the first random number, where the second key is a key corresponding to the first key; 利用所述第一随机数、第二随机数和第三随机数,确定所述锚点密钥。The anchor key is determined using the first random number, the second random number, and the third random number. 一种终端,其特征在于,包括:A terminal, comprising: 处理单元,用于生成第一随机数;a processing unit, configured to generate a first random number; 所述处理单元还用于根据所述第一随机数、第二随机数以及第三随机数,确定锚点密钥,所述锚点密钥用于所述终端通信。The processing unit is further configured to determine an anchor key according to the first random number, the second random number, and the third random number, where the anchor key is used for communication by the terminal. 根据权利要求27所述的终端,其特征在于,所述处理单元还用于:The terminal according to claim 27, wherein the processing unit is further configured to: 对所述第一随机数进行加密,得到加密后的第一随机数;Encrypting the first random number to obtain an encrypted first random number; 所述终端还包括:The terminal further includes: 第一收发单元,用于向认证服务器发送所述加密后的第一随机数。The first transceiver unit is configured to send the encrypted first random number to the authentication server. 根据权利要求27或28所述的终端,其特征在于,所述第二随机数由所述终端生成,所述第三随机数由所述认证服务器或移动性管理设备或者数据管理设备生成。The terminal according to claim 27 or 28, wherein the second random number is generated by the terminal, and the third random number is generated by the authentication server or a mobility management device or a data management device. 根据权利要求27至29中任一项所述的终端,其特征在于,所述终端还包括:The terminal according to any one of claims 27 to 29, wherein the terminal further comprises: 第二收发单元,用于接收所述数据管理设备通过所述认证服务器发送的第二验证值,所述第二验证值由所述终端的终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第二随机数确定的;a second transceiver unit, configured to receive a second verification value that is sent by the data management device by using the authentication server, where the second verification value is determined by a terminal identifier of the terminal, and the terminal that is saved by the data management device a registration password and the second random number determined; 所述处理单元还用于:根据所述终端标识、所述终端保存的自身的注册密码以及所述第二随机数确定第四验证值;根据所述第二验证值和所述第四验证值对认证服务器进行认证。The processing unit is further configured to: determine, according to the terminal identifier, a registration password saved by the terminal, and the second random number, a fourth verification value; according to the second verification value and the fourth verification value Authenticate the authentication server. 根据权利要求27至30中任一项所述的终端,其特征在于,所述终端还包括:The terminal according to any one of claims 27 to 30, wherein the terminal further comprises: 第三收发单元用于:向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法;或者向所述认证服务器发送所述终端支持的一种或者两种及以上的认证方法以及所述一种或者两种及以上的认证方法中每个认证方法的优先级。The third transceiver unit is configured to: send one or two or more authentication methods supported by the terminal to the authentication server; or send one or two or more authentications supported by the terminal to the authentication server. The method and the priority of each of the one or two or more authentication methods. 一种通信装置,其特征在于,包括:A communication device, comprising: 收发单元,用于从数据管理设备获取第一验证值和第二验证值;a transceiver unit, configured to acquire a first verification value and a second verification value from the data management device; 处理单元,用于根据所述第一验证值对终端进行认证;a processing unit, configured to authenticate the terminal according to the first verification value; 所述收发单元还用于在对所述终端认证的结果为合法的情况下,向所述终端发送所述第二验证值。The transceiver unit is further configured to send the second verification value to the terminal if the result of authenticating the terminal is legal. 根据权利要求32所述的装置,其特征在于,所述收发单元还用于:The device according to claim 32, wherein the transceiver unit is further configured to: 向所述数据管理设备发送所述终端的终端标识、所述第二随机数和所述第三随机数;Transmitting, to the data management device, a terminal identifier of the terminal, the second random number, and the third random number; 接收来自所述数据管理设备的所述第一验证值和所述第二验证值,其中,所述第一验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码以及所述第三随机数确定;所述第二验证值由所述终端标识、所述数据管理设备保存的所述终端的注册密码和所述第二随机数确定。Receiving the first verification value and the second verification value from the data management device, wherein the first verification value is identified by the terminal, a registration password of the terminal saved by the data management device, and The third random number is determined; the second verification value is determined by the terminal identifier, the registration password of the terminal and the second random number saved by the data management device. 根据权利要求32或33所述的装置,其特征在于,所述收发单元还用于:The device according to claim 32 or 33, wherein the transceiver unit is further configured to: 接收来自所述终端的第三验证值,所述第三验证值由所述第三随机数、所述终端的终端标识以及所述终端保存的自身的注册密码确定的;Receiving a third verification value from the terminal, where the third verification value is determined by the third random number, a terminal identifier of the terminal, and a registration password saved by the terminal; 所述处理单元还用于:The processing unit is further configured to: 若所述第一验证值等于所述第三验证值,则所述认证服务器确定所述终端合法;And if the first verification value is equal to the third verification value, the authentication server determines that the terminal is legal; 若所述第一验证值不等于所述第三验证值,则所述认证服务器确定所述终端不合法。And if the first verification value is not equal to the third verification value, the authentication server determines that the terminal is invalid. 一种通信装置,其特征在于,所述装置包括处理器和存储器;所述存储器用于存储计算机执行指令,当所述装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述装置执行如权利要求1-10中任意一项所述的通信方法。A communication device, comprising: a processor and a memory; the memory for storing computer execution instructions, the processor executing the computer execution instructions stored by the memory when the device is running The apparatus for performing the communication method according to any one of claims 1 to 10. 一种通信装置,其特征在于,所述装置包括处理器和存储器;所述存储器用于存储计算机执行指令,当所述装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述装置执行如权利要求11-15中任意一项所述的通信方法。A communication device, comprising: a processor and a memory; the memory for storing computer execution instructions, the processor executing the computer execution instructions stored by the memory when the device is running The apparatus for performing the communication method according to any one of claims 11-15. 一种通信装置,其特征在于,所述装置包括处理器和存储器;所述存储器用于存储计算机执行指令,当所述装置运行时,所述处理器执行所述存储器存储的所述计算机执行指令,以使所述装置执行如权利要求16-18中任意一项所述的通信方法。A communication device, comprising: a processor and a memory; the memory for storing computer execution instructions, the processor executing the computer execution instructions stored by the memory when the device is running And causing the apparatus to perform the communication method according to any one of claims 16-18. 一种通信系统,其特征在于,包括权利要求19至26中任一项所述的装置以及权利要求27至31中任一项所述的装置。A communication system comprising the apparatus of any one of claims 19 to 26 and the apparatus of any one of claims 27 to 31.
PCT/CN2018/074163 2018-01-25 2018-01-25 Communication method and communication apparatus Ceased WO2019144350A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880056744.1A CN111052779A (en) 2018-01-25 2018-01-25 Communication method and communication device
PCT/CN2018/074163 WO2019144350A1 (en) 2018-01-25 2018-01-25 Communication method and communication apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/074163 WO2019144350A1 (en) 2018-01-25 2018-01-25 Communication method and communication apparatus

Publications (1)

Publication Number Publication Date
WO2019144350A1 true WO2019144350A1 (en) 2019-08-01

Family

ID=67395237

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/074163 Ceased WO2019144350A1 (en) 2018-01-25 2018-01-25 Communication method and communication apparatus

Country Status (2)

Country Link
CN (1) CN111052779A (en)
WO (1) WO2019144350A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116097614A (en) * 2020-11-06 2023-05-09 Oppo广东移动通信有限公司 Access method, device and cloud platform device
CN116193433A (en) * 2021-11-26 2023-05-30 大唐移动通信设备有限公司 User authentication method, UDM (Universal description Messaging) and message forwarding device and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008110946A1 (en) * 2007-02-05 2008-09-18 Nokia Corporation Authentication procedure in an intelligent proxy for multi-access devices
CN104283899A (en) * 2014-10-30 2015-01-14 西安电子科技大学 User Anonymous Authentication Protocol Based on k-Pseudonym Set in Wireless Network
CN105933119A (en) * 2015-12-24 2016-09-07 中国银联股份有限公司 Authentication method and device
CN107317674A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Key distribution, authentication method, apparatus and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183938B (en) * 2007-10-22 2011-11-23 华中科技大学 Wireless network security transmission method, system and equipment
US8504836B2 (en) * 2008-12-29 2013-08-06 Motorola Mobility Llc Secure and efficient domain key distribution for device registration
US10716002B2 (en) * 2016-07-05 2020-07-14 Samsung Electronics Co., Ltd. Method and system for authenticating access in mobile wireless network system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008110946A1 (en) * 2007-02-05 2008-09-18 Nokia Corporation Authentication procedure in an intelligent proxy for multi-access devices
CN104283899A (en) * 2014-10-30 2015-01-14 西安电子科技大学 User Anonymous Authentication Protocol Based on k-Pseudonym Set in Wireless Network
CN105933119A (en) * 2015-12-24 2016-09-07 中国银联股份有限公司 Authentication method and device
CN107317674A (en) * 2016-04-27 2017-11-03 华为技术有限公司 Key distribution, authentication method, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116097614A (en) * 2020-11-06 2023-05-09 Oppo广东移动通信有限公司 Access method, device and cloud platform device
CN116193433A (en) * 2021-11-26 2023-05-30 大唐移动通信设备有限公司 User authentication method, UDM (Universal description Messaging) and message forwarding device and device

Also Published As

Publication number Publication date
CN111052779A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
US20230007475A1 (en) Method for Performing Verification by Using Shared Key, Method for Performing Verification by Using Public Key and Private Key, and Apparatus
KR102771844B1 (en) Method and device for multiple registrations
US11212676B2 (en) User identity privacy protection in public wireless local access network, WLAN, access
US10833876B2 (en) Protection of the UE identity during 802.1x carrier hotspot and Wi-Fi calling authentication
CN114258693B (en) Mobile device authentication without Electronic Subscriber Identity Module (ESIM) credentials
JP5597676B2 (en) Key material exchange
US10798082B2 (en) Network authentication triggering method and related device
KR102024653B1 (en) Access Methods, Devices, and Systems for User Equipment (UE)
CN112566119B (en) Terminal authentication method, device, computer equipment and storage medium
US20110035592A1 (en) Authentication method selection using a home enhanced node b profile
TW201345217A (en) Identity management with local functionality
CN113556227B (en) Network connection management method, device, computer readable medium and electronic equipment
CN112514436B (en) Secure, authenticated communication between initiator and responder
CN107205208B (en) Authentication method, terminal and server
US12413963B2 (en) Communication method and apparatus
US11553561B2 (en) Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication
US20190149326A1 (en) Key obtaining method and apparatus
CN111465007B (en) Authentication method, device and system
WO2019144350A1 (en) Communication method and communication apparatus
CN117098111A (en) Registration method and device of user equipment, computer readable medium and electronic equipment
WO2019140337A1 (en) Method and apparatus for multiple registrations
WO2018032984A1 (en) Access authentication method, ue, and access device
WO2024261514A1 (en) Authentication and key management for applications (akma) based silent two-factor authentication
HK1161498A (en) Home node-b apparatus and security protocols

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18902700

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18902700

Country of ref document: EP

Kind code of ref document: A1