WO2008134986A1 - A method, system and device for security function negotiation - Google Patents
A method, system and device for security function negotiation Download PDFInfo
- Publication number
- WO2008134986A1 WO2008134986A1 PCT/CN2008/070880 CN2008070880W WO2008134986A1 WO 2008134986 A1 WO2008134986 A1 WO 2008134986A1 CN 2008070880 W CN2008070880 W CN 2008070880W WO 2008134986 A1 WO2008134986 A1 WO 2008134986A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- encryption algorithm
- security capability
- network entity
- integrity protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/144—Reselecting a network or an air interface over a different radio air interface technology
- H04W36/1443—Reselecting a network or an air interface over a different radio air interface technology between licensed networks
Definitions
- the present invention relates to the field of communications, and in particular, to a method, system and device for negotiating security capabilities. Background technique
- the existing 3GPP (3rd Generation Partnership Project) wireless network is divided into a 3GPP radio access network and a core network.
- the 3GPP radio access network is divided into three types:
- 2G/2.5G access network 2G/2.5G access network, hereinafter referred to as 2G access network, including BTS (base station) and BSC (base station controller).
- BTS base station
- BSC base station controller
- UTRAN Universal Wireless Terrestrial Access Network
- 3G access network including NodeB (Node B) and RNC (Radio Network Controller).
- NodeB Node B
- RNC Radio Network Controller
- EUTRAN Evolved Universal Radio Land Access Network
- LTE Long Term Evolution Radio Access Network
- eNodeB Evolved Node B, hereinafter referred to as eNB
- radio access networks are used to implement functions related to wireless services, and at the same time to negotiate with terminal security capabilities.
- the core network of 2G/3G is further divided into circuit domain CS and packet domain PS.
- the role of the PS domain is to exchange and route data services with external packet networks, including SGSN (Serving GPRS Support Node) and GGSN (Gateway GPRS Support Node).
- the role of the SGSN is mainly to complete routing forwarding, mobility management, session management, user authentication, etc.
- the role of the GGSN is mainly responsible for connecting with external packet networks and for realizing the transmission of user plane data.
- the future evolution of the core network is also called SAE (system architecture evolution), including MME (shift Active management entity), SAE GW (SAE Gateway) / PDN GW (Packet Domain Network Gateway) / HSS (Home Network User Server) and other entities.
- MME shift Active management entity
- SAE GW SAE Gateway
- PDN GW Packet Domain Network Gateway
- HSS Home Network User Server
- MME shift Active management entity
- SAE GW SAE Gateway
- PDN GW Packet Domain Network Gateway
- HSS Home Network User Server
- the SGSN is negotiated between the signaling plane and the user plane security capability algorithm.
- the RNC is negotiated between the signaling plane and the user plane security capability algorithm.
- the function of performing NAS (non-access signaling) algorithm negotiation is moved up to the MME, and the RRC (Radio Resource Control) / UP (User Plane) algorithm negotiation is performed. The function is then moved down to the eNB.
- the security capability negotiation refers to the encryption algorithm for the 2G network, the integrity protection algorithm and the encryption algorithm for the 3G network, and the NAS algorithm (the encryption algorithm and the integrity protection algorithm) and the RRC algorithm for the LTE network. Algorithm and integrity protection algorithm), UP algorithm (encryption algorithm).
- the UE User Equipment
- the MME sends its own GERAN (Encryption Algorithm) / UTRAN security capability (encryption algorithm, integrity protection algorithm) to the MME in the initial layer 3 message; the MME then sends these capabilities of the UE to the SGSN.
- the SGSN selects the corresponding GERAN/UTRAN security capability algorithm and sends it to the UE through the MME.
- the security capability algorithm is selected by the SGSN.
- the RNC should select the security capability algorithm instead of the SGSN. Otherwise, the following new requirements should be introduced for the SGSN: Select the security capability algorithm.
- the SGSN must know the security capability of the RNC in some way, and then send the selected algorithm to the RNC, so it is necessary to additionally increase the interaction between the SGSN and the RNC.
- the SGSN queries the UE for its NAS (Encryption Algorithm, Integrity Protection Algorithm) / UP (Encryption Algorithm) / RRC (Encryption Algorithm, Integrity Protection Algorithm) security capabilities.
- NAS Encryption Algorithm, Integrity Protection Algorithm
- UP Encryption Algorithm
- RRC Encryption Algorithm, Integrity Protection Algorithm
- the embodiments of the present invention provide a method, system, and device for negotiating security capabilities, so that security capability negotiation can be conveniently performed when the network is switched.
- the embodiment of the invention provides a method for negotiating security capabilities, which is applied to negotiate security capabilities when the mobile network is switched, and includes the following steps:
- the second network receives the handover request sent by the first network
- the access network entity of the second network selects a corresponding security capability, or the access network entity and the core network entity of the second network respectively select corresponding security capabilities;
- the second network sends the selected security capability to the user equipment UE through the first network.
- the embodiment of the present invention further provides a security capability negotiation system, which is applied to negotiate a security capability when the mobile network is switched, and includes: an access network entity and a core network entity of the first network, and an access network entity and a core of the second network.
- a security capability negotiation system which is applied to negotiate a security capability when the mobile network is switched, and includes: an access network entity and a core network entity of the first network, and an access network entity and a core of the second network.
- the access network entity of the second network is configured to select a corresponding security capability when the first network requests to switch to the second network;
- the core network entity of the second network is configured to select a corresponding security capability with the access network entity of the second network when the first network requests to switch to the second network;
- the core network entity and the access network entity of the first network are configured to send the security capability selected by the second network to the user equipment UE.
- the embodiment of the invention further provides a network, including:
- An access network entity configured to receive a handover request sent by the peer network
- a core network entity configured to: when the peer network requests to switch to the local network, select an appropriate security capability with the access network entity of the local network, and send the selected security capability to the peer network User equipment.
- the embodiment of the present invention has the following beneficial effects: when switching from 2G/3G to the LTE network, the MME and the eNB respectively complete the negotiation of the NAS security algorithm and the RRC/UP security algorithm, thereby avoiding that the MME must pass some manner (for example, configuration or The communication message between the extension and the eNB is aware of the shortcomings of the security capabilities of the corresponding eNB; while switching from the LTE network to the 3G network, the disadvantage of introducing new requirements to the SGSN is avoided, and there is no need to additionally increase the SGSN and the RNC. Interaction. DRAWINGS
- 1 is a structural diagram of an existing 3GPP wireless network.
- FIG. 2 is a flow chart of a method for security capability negotiation when switching from a 2G/3G network to an LTE network according to Embodiment 1 of the present invention.
- FIG. 3 is a flow chart of security capability negotiation when switching from an LTE network to a 3G network according to Embodiment 2 of the present invention.
- FIG. 4 is a schematic structural diagram of a system for negotiating security capability according to Embodiment 3 of the present invention. detailed description
- a method for negotiating security capability includes the following steps:
- the network switches from 2G/3G to LTE.
- 2G/3G Access 2G/3G Access
- Step 201 The 2G/3G access network decides to initiate the handover.
- Step 202 The 2G/3G access network initiates a handover request message to the SGSN.
- Step 203 The SGSN sends a handover preparation request message to the MME, where the UE supports various security capability sets, including a NAS algorithm (encryption algorithm, integrity protection algorithm), an RRC algorithm (encryption algorithm, an integrity protection algorithm), and an UP algorithm. (Encryption Algorithm).
- NAS algorithm Encryption algorithm, integrity protection algorithm
- RRC algorithm Encryption algorithm, an integrity protection algorithm
- UP algorithm Encryption Algorithm
- the method for the SGSN to obtain various security capability sets supported by the UE is as follows: a.
- the SGSN can directly request the UE to send the set of security capabilities it supports; b.
- the 2G/3G access network entity (BSS or RNC) decides to initiate the handover. After the UE is requested to obtain the set of security capabilities supported by the UE, it is sent to the SGSN through step 202.
- BSS 2G/3G access network entity
- Step 204 The MME is based on the NAS algorithm (encryption algorithm, integrity protection algorithm) supported by the UE, and the NAS algorithm (encryption algorithm, integrity protection algorithm) allowed by the system, and combined with the NAS algorithm supported by itself (encryption algorithm, integrity protection) Algorithm) to select the NAS algorithm (encryption algorithm, integrity protection algorithm).
- the NAS algorithm (encryption algorithm, integrity protection algorithm) supported by the UE the NAS algorithm (encryption algorithm, integrity protection algorithm) allowed by the system, and the NAS algorithm (encryption algorithm, integrity protection algorithm) supported by the MME are all There are a variety of, so the choice here refers specifically to select the commonly supported NAS algorithm (encryption algorithm, integrity protection algorithm) from the above three types of NAS algorithms (encryption algorithm, integrity protection algorithm).
- Step 205 The MME sends a handover preparation request message to the eNB, where the RRC algorithm (encryption algorithm, integrity protection algorithm) and the UP algorithm (encryption algorithm) supported by the UE are carried; the RRC algorithm allowed by the system may also be carried (encryption algorithm, complete) Sex protection algorithm), UP algorithm (encryption algorithm).
- the RRC algorithm Encryption algorithm, integrity protection algorithm
- the UP algorithm encryption algorithm supported by the UE are carried
- the RRC algorithm allowed by the system may also be carried (encryption algorithm, complete) Sex protection algorithm), UP algorithm (encryption algorithm).
- Step 206 Establish bearer resources between the eNB and the MME, including a radio resource establishment process.
- Step 207 The eNB performs an RRC algorithm supported by the UE (encryption algorithm, integrity). Protection algorithm), UP algorithm (encryption algorithm), combined with its own supported RRC security capability set (encryption algorithm, integrity protection algorithm), UP security capability set (encryption algorithm), to select RRC algorithm (encryption algorithm, integrity protection) Algorithm), UP algorithm (encryption algorithm).
- the RRC algorithm (encryption algorithm, integrity protection algorithm), UP algorithm (encryption algorithm) supported by the UE, the RRC algorithm (encryption algorithm, integrity protection algorithm), UP algorithm (encryption algorithm) allowed by the system, the eNB itself
- the supported RRC algorithm (encryption algorithm, integrity protection algorithm) and UP algorithm (encryption algorithm) are various, so the selection here specifically refers to the above two types of RRC algorithms (encryption algorithm, integrity protection algorithm), In the UP algorithm (encryption algorithm), a commonly supported RRC algorithm (encryption algorithm, integrity protection algorithm) and UP algorithm (encryption algorithm) are selected.
- the MME sends the handover preparation request message to the eNB in step 205, and carries the RRC algorithm (encryption algorithm, integrity protection algorithm) and the UP algorithm (encryption algorithm) allowed by the system
- the eNB will also combine the RRC allowed by the system.
- the algorithm (encryption algorithm, integrity protection algorithm), UP algorithm (encryption algorithm) selects RRC algorithm (encryption algorithm, integrity protection algorithm), UP algorithm (encryption algorithm).
- Step 208 The eNB sends a handover preparation confirmation message to the MME, where the RRC algorithm (encryption algorithm, integrity protection algorithm) and UP algorithm (encryption algorithm) are carried.
- RRC algorithm encryption algorithm, integrity protection algorithm
- UP algorithm encryption algorithm
- Step 209 The MME sends a handover preparation confirmation message to the SGSN, where the selected NAS algorithm (encryption algorithm, integrity protection algorithm), RRC algorithm (encryption algorithm, integrity protection algorithm), and UP algorithm (encryption algorithm) are carried.
- NAS algorithm encryption algorithm, integrity protection algorithm
- RRC algorithm encryption algorithm, integrity protection algorithm
- UP algorithm encryption algorithm
- Steps 210-211 the SGSN sends a handover command message to the UE through the 2G/3G access network, instructing it to switch to the target network. It carries the selected NAS algorithm (encryption algorithm, integrity protection algorithm), RRC algorithm (encryption algorithm, integrity protection algorithm), and UP algorithm (encryption algorithm).
- NAS algorithm Encryption algorithm, integrity protection algorithm
- RRC algorithm Encryption algorithm, integrity protection algorithm
- UP algorithm encryption algorithm
- Step 212 continuing the subsequent switching process.
- step 204 can also be performed at any step between step 205 and step 209.
- Step 207 can also be performed prior to step 206.
- the UE and the MME are protected by the NAS algorithm, and the UE and the eNB are protected by the RRC/UP algorithm, and the MME and the eNB respectively complete the NAS security algorithm.
- the negotiation of the RRC/UP security algorithm avoids the disadvantage that the MME must know the security capabilities of the corresponding eNB in some way (for example, configuration or extension and interaction message between eNBs) in the prior art solution.
- the method for negotiating security capability according to Embodiment 2 of the present invention includes the following steps:
- the network is switched from LTE to 3G.
- the current UE accesses the service through the LTE access network (eNB).
- eNB LTE access network
- Step 301 The eNB determines to initiate a handover.
- Step 302 The eNB initiates a handover request message to the MME.
- Step 303 The MME sends a handover preparation request message to the SGSN, where the MME supports the 3G security capability set supported by the UE, including an encryption algorithm and an integrity protection algorithm.
- the method for the MME to obtain the 3G security capability set supported by the UE is as follows: a.
- the UE sends the supported 3G security capability set to the MME in the initial layer 3 message before the handover;
- the MME directly requests the UE to send its supported 3G security capability set
- the UE After the eNB decides to initiate the handover, the UE is requested to obtain the 3G security capability set supported by the UE, and then sent to the MME in step 302.
- Step 304 The SGSN sends a handover preparation request message to the 3G access network (RNC), where the 3G security capability set supported by the UE, including the encryption algorithm and the integrity protection algorithm, may also carry the 3G security capability set allowed by the system.
- RNC 3G access network
- Step 305 Establish bearer resources between the 3G access network (RNC) and the SGSN, including a radio resource establishment process.
- Step 306 The 3G access network (RNC) selects the 3G security capability set according to the 3G security capability set supported by the UE and the 3G security capability set supported by the UE.
- the 3G access network itself supports a variety of 3G security capability sets. Therefore, the selection here specifically refers to the selection of the two types of 3G security capabilities from the foregoing. Supported 3G security capability set (encryption algorithm, integrity protection algorithm).
- the 3G access network (RNC) will also combine the 3G security allowed by the system.
- the capability set to select the 3G security capability step 307 the 3G access network (RNC) sends a handover preparation confirmation message to the SGSN, which carries the selected 3G security capability set.
- Step 308 The SGSN sends a handover preparation confirmation message to the MME, where the selected 3G security capability set is carried.
- Step 309-310 the MME sends a handover command message to the UE through the eNB, instructing it to switch to the target network. It carries the selected 3G security capability set.
- Step 311 Continue the subsequent handover process.
- Step 306 can also be performed prior to step 305.
- This embodiment can avoid the disadvantage of introducing new requirements to the SGSN when switching from LTE to 3G networks.
- the third embodiment of the present invention provides a security capability negotiation system, which is used for negotiating security capabilities during handover of a mobile network, including: an access network entity 401 and a core network entity 402 of the first network, An access network entity 403 and a core network entity 404 of the second network, where the access network entity 403 of the second network is configured to select a corresponding security capability when the first network requests to switch to the second network;
- the core network entity 404 of the network is configured to access the network entity with the second network when the first network requests to switch to the second network
- the 403 selects a corresponding security capability
- the core network entity 402 and the access network entity 401 of the first network are configured to send the security capability selected by the second network to the user equipment UE 405.
- the embodiment provides a network, including: an access network entity, configured to receive a handover request sent by a peer network; and a core network entity, configured to: when the peer network requests to switch to the local network, The access network entity selects a corresponding security capability, and sends the selected security capability to the user equipment through the peer network.
- the first network is a 2G or 3G network
- the access network entity of the 2G network includes a base station BTS and a base station controller BSC
- the access network entity of the 3G network includes a node NodeB and a wireless network.
- the core network entity of the 2G or 3G network comprises a serving GPRS support node SGSN;
- the second network is a long term evolution radio access network LTE, the access network entity is an evolved node eNodeB, and the core network entity is a mobility management entity MME.
- Security capabilities include non-access signaling NAS integrity protection and encryption algorithms, radio resource control RRC integrity protection and encryption algorithms, and user-side UP encryption algorithms.
- the MME is used to select the NAS integrity protection and encryption algorithm
- the eNodeB is used to select the RRC integrity protection and encryption algorithm and the UP encryption algorithm.
- the working principle and process are shown in Figure 2, which is not described here.
- the MME and the eNB perform the negotiation of the NAS security algorithm and the RRC/UP security algorithm, respectively, so that the MME must be aware of the corresponding information in a certain manner (for example, configuration or extension and an interaction message between the eNBs) in the prior art solution. Disadvantages of the security capabilities of the eNB.
- the access network entity of the first network is an eNodeB
- the core network entity of the first network is the mobility management entity MME
- the access network entity of the second network is the RNC
- the core of the second network is a serving GPRS support node SGSN.
- the security capability includes a 3G security capability set, and the 3G security capability set further includes an encryption algorithm and an integrity protection algorithm. The working principle and process are shown in Figure 2, and will not be described here.
- the RNC is used to select the 3G security capability set, which avoids the disadvantage of introducing new requirements to the SGSN when switching from LTE to 3G networks, and does not require additional SGSN and RNC. The interaction between.
- the present invention can be implemented by hardware, or can be implemented by means of software plus necessary general hardware platform, and the technical solution of the present invention. It can be embodied in the form of a software product that can be stored in a non-volatile storage medium (which can be a CD-ROM, a USB flash drive, a mobile hard disk, etc.), including a number of instructions for making a communication device (may It is a personal computer, a server, or a network device, etc.) that performs the methods described in various embodiments of the present invention.
- a non-volatile storage medium which can be a CD-ROM, a USB flash drive, a mobile hard disk, etc.
- a communication device may It is a personal computer, a server, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Description
安全能力协商的方法、 系统及设备 技术领域
本发明涉及通信领域, 尤其是涉及一种安全能力协商的方法、 系 统及设备。 背景技术
请参照图 1所示, 现有的 3GPP (第 3代伙伴工程) 无线网络分 为 3 GPP无线接入网和核心网两部分。
3GPP无线接入网分为 3种:
GERAN ( GSM边缘无线接入网) : 2G/2.5G 接入网, 如下统 称为 2G接入网, 包括 BTS (基站) 和 BSC (基站控制器) 。
UTRAN (通用无线陆地接入网 ): 3G接入网, 包括 NodeB (节 点 B ) 和 RNC (无线网络控制器) 。
EUTRAN (演进的通用无线陆地接入网 ) ·· 一种未来演进的 LTE (长期演进的无线接入网 )接入网, 包括 eNodeB (演进的节点 B , 以下简称 eNB ) 。
上述三种无线接入网都用来实现和无线业务相关的功能, 同 时实现和终端安全能力的协商。
2G/3G的核心网又分为电路域 CS和分组域 PS。 为了简便起见, 这里省略了电路域 CS的相关实体, 仅保留 PS域。 PS域的作用是事 先与外部分组网络的数据业务交换和路由, 包括 SGSN (服务 GPRS 支持节点) 和 GGSN (网关 GPRS支持节点) 。 SGSN的作用主要是 完成路由转发、 移动性管理、 会话管理、 用户鉴权等, GGSN的作 用主要是负责和外部分组网络连接, 并负责实现用户面数据的传 输。
未来演进的核心网又叫 SAE (系统架构演进), 包括 MME (移
动管理实体) 、 SAE GW ( SAE网关) /PDN GW (分组域网络网关) /HSS (归属网络用户服务器) 等实体。 MME的作用和 SGSN类似, 主要完成移动性管理、 用户鉴权等功能。 SAE/PDN GW用于充当 不同接入系统间的用户面锚点。 HSS主要用于存储用户签约数据。
在 2G网络中, 执行信令面和用户面安全能力算法协商的是 SGSN。 3G网络中, 执行信令面和用户面安全能力算法协商的是 RNC。 在演进网络 LTE/SAE中, 由于 RNC/SGSN不再存在, 执行 NAS (非接入信令 )算法协商的功能上移到 MME, 而执行 RRC (无 线资源控制) /UP (用户面) 算法协商的功能则下移到 eNB。
当用户从 2G/3G网络(比如 2G/3G ) 切换到 LTE网络时, 或者 从 LTE切换到 2G/3G网络时, 由于执行安全能力协商的实体发生了 变化, 并且这些实体的安全能力不一定一样, 因此需要重新执行 安全能力协商过程。 这里的安全能力协商对于 2G网络来说指加密 算法, 对于 3G网络来说指完整性保护算法和加密算法, 对 LTE网 络来说指 NAS算法(加密算法和完整性保护算法)、 RRC算法(加 密算法和完整性保护算法) 、 UP算法 (加密算法) 。
具体地, 当从 LTE网络切换到 2G/3G网络时:
UE (用户设备)将自身的 GERAN (加密算法 ) /UTRAN安全能 力(加密算法、完整性保护算法)在初始层 3消息中发给 MME; MME 再把 UE 的这些能力发送到 SGSN 。 SGSN 选择相应的 GERAN/UTRAN安全能力算法,通过 MME发给 UE。 当从 LTE切换 到 2G时, 由 SGSN选择安全能力算法。 但当从 LTE切换到 3G时, 才艮据上述 3G网络的描述, 应该由 RNC来选择安全能力算法, 而不 是由 SGSN来选择, 否则会导致对 SGSN引入如下新的需求: 选择安 全能力算法的功能。 并且此时 SGSN必须通过某种方式知道 RNC的 安全能力, 然后把选择的算法发给 RNC, 因此将需要额外增加 SGSN 和 RNC之间的交互。
从 2G/3G切换到 LTE时:
SGSN向 UE查询其 NAS (加密算法、 完整性保护算法) /UP (加 密算法) /RRC (加密算法、 完整性保护算法)安全能力。 从 2G/3G 切换到 LTE时 SGSN把 UE的这些能力发送到 MME。 MME选择所 有的 NAS/RRC/UP安全能力算法, 通过 SGSN发给 UE。
在实现本发明的过程中,发现现有技术中由于 MME将选择所有 的 NAS/RRC/UP安全能力算法,将导致 MME必须通过某种方式(例 如配置或者扩展和 eNB之间的交互消息)知道相应的 eNB的安全能 力, 从而造成配置不灵活、 工作流程复杂的缺点。 发明内容
本发明实施例提供了一种安全能力协商的方法、 系统及设备, 使 得在网络切换时能便捷地进行安全能力协商。
本发明实施例提供一种安全能力协商的方法,应用于移动网络切 换时对安全能力进行协商, 包括以下步骤:
A. 第二网络接收第一网络发送的切换请求;
B. 所述第二网络的接入网实体选择相应的安全能力, 或者所述 第二网络的接入网实体和核心网实体分别选择相应的安全能力; 以及
C. 所述第二网络将选择的安全能力通过所述第一网络发送给用 户设备 UE。
本发明实施例还提供一种安全能力协商系统,应用于移动网络切 换时对安全能力进行协商, 包括: 第一网络的接入网实体和核心网实 体、 第二网络的接入网实体和核心网实体,
所述第二网络的接入网实体用于当第一网络请求切换到第二网 络时, 选择相应的安全能力;
所述第二网络的核心网实体用于当第一网络请求切换到第二网 络时, 与所述第二网络的接入网实体分别选择相应的安全能力;
所述第一网络的核心网实体和接入网实体用于将所述第二网络 选择的安全能力发送给用户设备 UE。
本发明实施例还提供一种网络, 包括:
接入网实体, 用于接收对端网络发送的切换请求;
核心网实体, 用于当对端网络请求切换到本网络时, 与所述本网 络的接入网实体分别选择相应的安全能力,并将所述选择的安全能力 通过所述对端网络发送给用户设备。
本发明实施例具有以下有益的效果:从 2G/3G切换到 LTE网络 时, MME和 eNB分别完成 NAS安全算法、 RRC/UP安全算法的 协商, 从而避免了 MME必须通过某种方式(例如配置或者扩展和 eNB之间的交互消息)知道相应的 eNB的安全能力的缺点;而从 LTE 网络切换到 3G网络时, 避免了对 SGSN引入新的需求的缺点, 也 不需要额外增加 SGSN和 RNC之间的交互。 附图说明
图 1是现有 3GPP无线网络结构图。
图 2是本发明实施例一从 2G/3G网络切换到 LTE网络时安全能 力协商的方法的流程图。
图 3是本发明实施例二从 LTE网络切换到 3G网络时安全能力协 商的流程图。
图 4是本发明实施例三安全能力协商的系统的结构示意图。 具体实施方式
以下结合附图对本发明实施例进行详细描述。
请参照图 2所示,本发明实施例一安全能力协商的方法包括以下 步骤:
本实施例中, 网络从 2G/3G切换到 LTE。 首先 4叚设目前 UE通过
2G/3G接入网 (2G/3G Access )访问业务。
步骤 201 , 2G/3G接入网决定发起切换。
步骤 202 , 2G/3G接入网向 SGSN发起切换请求消息。
步骤 203 , SGSN向 MME发起切换准备请求消息,其中携带 UE 支持的各种安全能力集, 包括 NAS算法(加密算法、 完整性保护算 法)、 RRC算法(加密算法、完整性保护算法)、 UP算法(加密算法)。
这里的 SGSN获取 UE支持的各种安全能力集的方法有: a. SGSN可以通过直接请求 UE发送其支持的安全能力集; b. 2G/3G接入网实体(BSS或者 RNC ) 决定发起切换后, 先请 求 UE得到其支持的安全能力集后, 再通过步骤 202发给 SGSN。
步骤 204 , MME根据 UE支持的 NAS算法(加密算法、 完整性 保护算法 ) ,以及系统允许的 NAS算法(加密算法、完整性保护算法 ), 并结合自身支持的 NAS算法(加密算法、 完整性保护算法), 来选择 NAS算法(加密算法、 完整性保护算法)。
应当理解, 由于 UE支持的 NAS算法 (加密算法、 完整性保护 算法)、 系统允许的 NAS算法(加密算法、 完整性保护算法)、 MME 自身支持的 NAS算法(加密算法、 完整性保护算法) 均有多种, 因 此此处的选择具体是指从前述这三类 NAS算法 (加密算法、 完整性 保护算法) 中选择共同支持的 NAS算法(加密算法、 完整性保护算 法)。
步骤 205 , MME向 eNB发送切换准备请求消息, 其中携带 UE 支持的 RRC算法(加密性算法、 完整性保护算法)、 UP算法(加密 算法); 还可能携带系统允许的 RRC算法(加密算法、 完整性保护算 法)、 UP算法(加密算法)。
步骤 206 , eNB和 MME之间的承载资源建立, 包括无线资源建 立过程。
步骤 207 , eNB根据 UE支持的 RRC算法(加密算法、 完整性
保护算法)、 UP算法(加密算法), 并结合自身支持的 RRC安全能力 集(加密算法、 完整性保护算法)、 UP安全能力集(加密算法), 来 选择 RRC算法(加密算法、完整性保护算法)、 UP算法(加密算法)。
应当理解, 由于 UE支持的 RRC算法 (加密算法、 完整性保护 算法)、 UP算法(加密算法), 系统允许的 RRC算法(加密算法、 完 整性保护算法)、 UP算法(加密算法), eNB自身支持的 RRC算法(加 密算法、 完整性保护算法)、 UP算法(加密算法)均有多种, 因此此 处的选择具体是指从前述这二类 RRC算法(加密算法、 完整性保护 算法)、 UP算法(加密算法) 中选择共同支持的 RRC算法(加密算 法、 完整性保护算法)、 UP算法 (加密算法)。
如果步骤 205 中 MME向 eNB发送切换准备请求消息里还携带 了系统允许的 RRC算法(加密算法、完整性保护算法)、 UP算法(加 密算法 ), 则此时 eNB还将结合该系统允许的 RRC算法(加密算法、 完整性保护算法)、 UP算法(加密算法)来选择 RRC算法(加密算 法、 完整性保护算法)、 UP算法 (加密算法)。
步骤 208 , eNB给 MME发送切换准备确认消息, 其中携带选择 的 RRC算法(加密算法、 完整性保护算法)、 UP算法(加密算法)。
步骤 209 , MME给 SGSN发送切换准备确认消息, 其中携带选 择的 NAS算法(加密算法、 完整性保护算法)、 RRC算法(加密性 算法、 完整性保护算法)、 UP算法(加密算法)。
步骤 210-211 , SGSN通过 2G/3G接入网给 UE发送切换命令消 息, 指示其切换到目标网络。 其中携带选择的 NAS算法(加密算法、 完整性保护算法)、 RRC算法(加密算法、 完整性保护算法)、 UP算 法(加密算法)。
步骤 212 , 继续后续切换过程。
从而完成了 UE和网络设备 ( eNB/MME )之间的安全能力协商 过程。
上述步骤 204还可以在步骤 205到步骤 209之间的任一步进行。 步骤 207也可以在步骤 206之前进行。
本实施例中,当从 2G/3G切换到 LTE网络时,由于 UE与 MME 之间通过 NAS算法保护, UE与 eNB之间通过 RRC/UP算法保护, 釆用 MME和 eNB分别完成 NAS安全算法、 RRC/UP安全算法的 协商, 从而避免了现有技术方案中 MME必须通过某种方式(例如 配置或者扩展和 eNB之间的交互消息 )知道相应的 eNB的安全能力 的缺点。
请参照图 3所示,本发明实施例二安全能力协商的方法包括以下 步骤:
本实施例中 ,网络从 LTE切换到 3G。首先 4叚设目前 UE通过 LTE 接入网 (eNB )访问业务。
步骤 301 , eNB决定发起切换。
步骤 302 , eNB向 MME发起切换请求消息。
步骤 303 , MME向 SGSN发起切换准备请求消息,其中携带 UE 支持的 3G安全能力集, 包括加密算法、 完整性保护算法。
这里的 MME获取 UE支持的 3G安全能力集的方法有: a. UE在切换之前初始层 3消息中已经携带其支持的 3G安全能 力集发送给 MME;
b. MME直接请求 UE发送其支持的 3G安全能力集;
c eNB决定发起切换后, 先请求 UE得到其支持的 3G安全能力 集后, 再通过步骤 302发送给 MME。
步骤 304 , SGSN向 3G接入网 ( RNC )发送切换准备请求消息, 其中携带 UE支持的 3G安全能力集, 包括加密算法、 完整性保护算 法, 还可能携带系统允许的 3G安全能力集。
步骤 305 , 3G接入网 (RNC )和 SGSN之间的承载资源建立, 包括无线资源建立过程。
步骤 306, 3G接入网 (RNC )根据 UE支持的 3G安全能力集, 并结合本身支持的 3G安全能力集, 来选择 3G安全能力集。
应当理解, 由于 UE支持的 3G安全能力集, 3G接入网 (RNC ) 自身支持的 3G安全能力集均有多种, 因此此处的选择具体是指从前 述这二类 3G安全能力集中选择共同支持的 3G安全能力集(加密算 法、 完整性保护算法)。
如果步骤 304中 SGSN向 3G接入网 ( RNC )发送的切换准备请 求消息里还携带了系统允许的 3G安全能力集, 则此时 3G接入网 ( RNC )还将结合该系统允许的 3G安全能力集来选择 3G安全能力 步骤 307 , 3G接入网 (RNC )给 SGSN发送切换准备确认消息, 其中携带选择的 3G安全能力集。
步骤 308, SGSN给 MME发送切换准备确认消息, 其中携带选 择的 3G安全能力集。
步骤 309-310, MME通过 eNB给 UE发送切换命令消息, 指示 其切换到目标网络。 其中携带选择的 3G安全能力集。
步骤 311、 继续后续切换过程。
从而完成了 UE和网络设备 ( RNC )之间的安全能力协商过程。 步骤 306也可以在步骤 305之前进行。
本实施例可以避免从 LTE切换到 3 G网络时会对 SGSN引入新 的需求的缺点。
请再参照图 4所示,本发明实施例三提供一种安全能力协商系统, 应用于移动网络切换时对安全能力进行协商, 包括: 第一网络的接入 网实体 401和核心网实体 402、 第二网络的接入网实体 403和核心网实 体 404,所述第二网络的接入网实体 403用于当第一网络请求切换到第 二网络时, 选择相应的安全能力; 所述第二网络的核心网实体 404用 于当第一网络请求切换到第二网络时,与所述第二网络的接入网实体
403分别选择相应的安全能力;所述第一网络的核心网实体 402和接入 网实体 401用于将所述第二网络选择的安全能力发送给用户设备 UE405。
本实施例提供了一种网络, 包括: 接入网实体, 用于接收对端 网络发送的切换请求; 核心网实体, 用于当对端网络请求切换到本网 络时, 与所述本网络的接入网实体分别选择相应的安全能力, 并将所 述选择的安全能力通过所述对端网络发送给用户设备。
当从 2G/3G网络切换到 LTE网络时,第一网络是 2G或 3G网络, 2G 网络的接入网实体包括基站 BTS和基站控制器 BSC, 3G网络的接入网 实体包括节点 NodeB和无线网络控制器 RNC; 2G或 3G网络的核心网 实体包括服务 GPRS支持节点 SGSN;第二网络是长期演进的无线接入 网络 LTE,其接入网实体是演进的节点 eNodeB,核心网实体是移动管 理实体 MME。安全能力包括非接入信令 NAS完整性保护和加密算法、 无线资源控制 RRC完整性保护和加密算法、用户面 UP加密算法。 MME 用于选择 NAS完整性保护和加密算法, eNodeB用于选择 RRC完整性 保护和加密算法、 UP加密算法。 其工作原理及过程如图 2所示, 此不 赘述。 由于釆用 MME和 eNB分别完成 NAS安全算法、 RRC/UP安全 算法的协商, 从而避免了现有技术方案中 MME必须通过某种方式 (例如配置或者扩展和 eNB之间的交互消息)知道相应的 eNB的安全 能力的缺点。
当从 LTE 网络切换到 3G 网络时, 第一网络的接入网实体是 eNodeB, 第一网络的核心网实体是移动管理实体 MME, 第二网络的 接入网实体是 RNC, 第二网络的核心网实体是服务 GPRS支持节点 SGSN。 安全能力包括 3G安全能力集, 3G安全能力集进一步包括加 密算法、完整性保护算法。其工作原理及过程如图 2所示,此不赘述。 RNC用于选择 3G安全能力集, 避免了从 LTE切换到 3G网络时会 对 SGSN引入新的需求的缺点, 也不需要额外增加 SGSN和 RNC
之间的交互。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解 到本发明可以通过硬件实现,也可以可借助软件加必要的通用硬件平 台的方式来实现基于这样的理解,本发明的技术方案可以以软件产品 的形式体现出来, 该软件产品可以存储在一个非易失性存储介质(可 以是 CD-ROM, U盘, 移动硬盘等) 中, 包括若干指令用以使得一 台通讯设备(可以是个人计算机, 服务器, 或者网络设备等)执行本 发明各个实施例所述的方法。
以上仅为本发明的较佳实施例而已,并非用于限定本发明的保护 范围。 凡在本发明的精神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。
Claims
1、 一种安全能力协商的方法, 应用于移动网络切换时对安全能 力进行协商, 其特征在于, 所述方法包括以下步骤:
A. 第二网络接收第一网络发送的切换请求;
B. 所述第二网络的接入网实体选择相应的安全能力, 或者所述 第二网络的接入网实体和核心网实体分别选择相应的安全能力; 以及
C. 所述第二网络将选择的安全能力通过所述第一网络发送给用 户设备 UE。
2、 根据权利要求 1所述的方法, 其特征在于: 所述步骤 A进一步 包括:
A1. 所述第一网络的接入网实体向第一网络的核心网实体发送 切换请求消息; 以及
A2. 所述第一网络的核心网实体向所述第二网络的核心网实体 发送切换准备请求消息 , 携带 UE支持的安全能力集。
3、 根据权利要求 2所述的方法, 其特征在于: 所述步骤 A2之前, 所述第一网络的核心网实体通过以下方式之一获取 UE支持的安全能 力集: 所述第一网络的核心网实体直接请求 UE发送其支持的安全能 力集; 或者由所述第一网络的接入网实体决定发起切换后先请求 UE 得到其支持的安全能力集, 再通过所述步骤 A1在切换请求消息中发 送给所述第一网络的核心网实体。
4、根据权利要求 1所述的方法, 其特征在于: 所述第一网络是 2G 或 3G网络, 所述 2G网络的接入网实体包括基站 BTS和基站控制器 BSC, 所述 3G网络的接入网实体包括节点 NodeB和无线网络控制器 RNC;所述 2G或 3G网络的核心网实体包括服务 GPRS支持节点 SGSN; 所述第二网络是长期演进的无线接入网络 LTE, 其接入网实体是演进 的节点 eNodeB , 核心网实体是移动管理实体 MME; 所述步骤 B中由 所述 eNodeB和 MME分别选择相应的安全能力。
5、 根据权利要求 4所述的方法, 其特征在于: 所述步骤 B具体 包括:
B 1. 所述 MME向所述 eNodeB发送切换准备请求消息,携带 UE 支持的无线资源控制 RRC完整性保护和加密算法、 用户面 UP加密 算法; 以及
B2. 所述 eNodeB根据 UE支持的无线资源控制 RRC完整性保护 和加密算法、 用户面 UP加密算法, 并结合自身支持的 RRC完整性 保护和加密算法、 UP加密算法, 来选择共同支持的 RRC完整性保护 和加密算法、 up加密算法。
6、 根据权利要求 5所述的方法, 其特征在于: 所述步骤 B具体 还包括:
所述步骤 B1 中所述 MME还向所述 eNodeB发送系统允许的 RRC 完整性保护和加密算法、 UP加密算法, 所述步骤 B2 中所述 eNodeB还将结合所述系统允许的 RRC完整性保护和加密算法、 UP 加密算法来选择共同支持的 RRC完整性保护和加密算法、 UP加密算 法。
7、 根据权利要求 5所述的方法, 其特征在于: 所述步骤 B具体 还包括: 所述 MME根据 UE支持的非接入信令 NAS完整性保护和 加密算法, 以及系统允许的 NAS完整性保护和加密算法, 并结合自 身支持的 NAS完整性保护和加密算法,来选择共同支持的 NAS完整 性保护和加密算法。
8、 根据权利要求 5所述的方法, 其特征在于: 所述步骤 C进一 步包括:
C1. 所述 eNodeB向所述 MME发送切换准备确认消息, 携带选 择的 RRC完整性保护和加密算法、 UP加密算法;
C2. 所述 MME向所述 SGSN发送切换准备确认消息,携带选择 的 NAS 完整性保护和加密算法、 RRC 完整性保护和加密算法、 UP
加密算法; 以及
C3. 所述 SGSN通过所述 2G/3G接入网向 UE发送切换命令,指 示其切换到所述 LTE网络, 所述切换命令携带所述选择的 NAS完整 性保护和加密算法、 RRC完整性保护和加密算法、 UP加密算法。
9、根据权利要求 8所述的方法, 其特征在于: 所述步骤 C2中所 述 MME向所述 SGSN发送切换准备确认消息之前, 所述 MME根据 UE支持的非接入信令 NAS完整性保护和加密算法,以及系统允许的 NAS完整性保护和加密算法, 并结合自身支持的 NAS完整性保护和 加密算法, 来选择共同支持的 NAS完整性保护和加密算法。
10、 根据权利要求 1所述的方法, 其特征在于: 所述第一网络是 LTE网络, 其接入网实体是 eNodeB, 核心网实体是 MME; 所述第二 网络是 3G网络, 其接入网实体是 RNC, 核心网实体是 SGSN; 所述 步骤 B中由所述 RNC选择相应的安全能力。
11、 根据权利要求 3所述的方法, 其特征在于: 所述第一网络的 核心网实体还可在初始层 3消息中获取所述消息携带的 UE所支持的 3G安全能力集。
12、 根据权利要求 10所述的方法, 其特征在于: 所述步骤 B具体 包括:
所述 SGSN向所述 RNC发送切换准备请求消息, 携带 UE支持 的 3G安全能力以及系统允许的 3G能力,所述 3G安全能力集均包括 加密算法、 完整性保护算法; 以及
所述 RNC根据 UE支持的 3G安全能力集, 以及系统允许的 3G 安全能力,并结合本身支持的 3G安全能力集,来选择共同支持的 3G 安全能力集。
13、 根据权利要求 12所述的方法, 其特征在于: 所述步骤 C具 体包括:
C1'. 所述 RNC向所述 SGSN发送切换准备确认消息,携带选择
C2'. 所述 SGSN向所述 MME发送切换准备确认消息, 携带所 述选择的 3G安全能力集; 以及
C3'. 所述 MME通过所述 eNodeB向 UE发送切换命令, 指示其切 换到所述 3 G网络, 所述切换命令携带所述选择的 3 G安全能力集。
14、 一种安全能力协商系统, 应用于移动网络切换时对安全能力 进行协商, 包括: 第一网络的接入网实体和核心网实体、 第二网络的 接入网实体和核心网实体, 其特征在于:
所述第二网络的接入网实体用于当第一网络请求切换到第二网 络时, 选择相应的安全能力;
所述第二网络的核心网实体用于当第一网络请求切换到第二网 络时, 与所述第二网络的接入网实体分别选择相应的安全能力;
所述第一网络的核心网实体和接入网实体用于将所述第二网络 选择的安全能力发送给用户设备 UE。
15、 根据权利要求 14所述的系统, 其特征在于: 所述第一网络是 2G或 3G网络, 所述第二网络是长期演进的无线接入网络 LTE, 其接 入网实体是演进的节点 eNodeB, 核心网实体是移动管理实体 MME; 所述安全能力包括非接入信令 NAS完整性保护和加密算法、无线资源 控制 RRC完整性保护和加密算法、 用户面 UP加密算法; 所述 MME用 于选择所述 NAS完整性保护和加密算法, 所述 eNodeB用于选择所述 RRC完整性保护和加密算法、 UP加密算法。
16、 根据权利要求 14所述的系统, 其特征在于: 所述第一网络 为 LTE,其接入网实体是 eNodeB,核心网实体是移动管理实体 MME; 所述第二网络为 3G,其接入网实体是 RNC,核心网实体是服务 GPRS 支持节点 SGSN; 所述安全能力包括 3G安全能力集, 所述 3G安全 能力集进一步包括加密算法、 完整性保护算法; 所述 RNC用于选择
17、 一种网络, 其特征在于, 包括:
接入网实体, 用于接收对端网络发送的切换请求;
核心网实体, 用于当对端网络请求切换到本网络时, 与所述本网 络的接入网实体分别选择相应的安全能力,并将所述选择的安全能力 通过所述对端网络发送给用户设备。
Priority Applications (9)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP15178977.3A EP2966889B1 (en) | 2007-05-08 | 2008-05-05 | Security capability negotiation method, system, and equipment |
| ES08734236.6T ES2554808T3 (es) | 2007-05-08 | 2008-05-05 | Método, sistema y equipamiento de negociación de capacidad de seguridad |
| JP2009553896A JP5010690B2 (ja) | 2007-05-08 | 2008-05-05 | セキュリティ機能ネゴシエーション方法、システム、および装置 |
| EP19155180.3A EP3554112B1 (en) | 2007-05-08 | 2008-05-05 | Security capability negotiation methods and devices |
| EP08734236.6A EP2117248B1 (en) | 2007-05-08 | 2008-05-05 | A method, system and device for security function negotiation |
| US12/503,942 US8774759B2 (en) | 2007-05-08 | 2009-07-16 | Security capability negotiation method, system, and equipment |
| US14/298,341 US9668182B2 (en) | 2007-05-08 | 2014-06-06 | Security capability negotiation method, system, and equipment |
| US15/495,607 US10383017B2 (en) | 2007-05-08 | 2017-04-24 | Security capability negotiation method, system, and equipment |
| US16/538,492 US10958692B2 (en) | 2007-05-08 | 2019-08-12 | Security capability negotiation method, system, and equipment |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200710074333.9 | 2007-05-08 | ||
| CN2007100743339A CN101304600B (zh) | 2007-05-08 | 2007-05-08 | 安全能力协商的方法及系统 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/503,942 Continuation US8774759B2 (en) | 2007-05-08 | 2009-07-16 | Security capability negotiation method, system, and equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008134986A1 true WO2008134986A1 (en) | 2008-11-13 |
Family
ID=39943141
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2008/070880 Ceased WO2008134986A1 (en) | 2007-05-08 | 2008-05-05 | A method, system and device for security function negotiation |
Country Status (6)
| Country | Link |
|---|---|
| US (4) | US8774759B2 (zh) |
| EP (3) | EP3554112B1 (zh) |
| JP (1) | JP5010690B2 (zh) |
| CN (1) | CN101304600B (zh) |
| ES (1) | ES2554808T3 (zh) |
| WO (1) | WO2008134986A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110419205A (zh) * | 2017-01-30 | 2019-11-05 | 瑞典爱立信有限公司 | 针对用户平面数据的完整性保护的方法 |
Families Citing this family (43)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| HUE031465T2 (en) | 2006-11-01 | 2017-07-28 | ERICSSON TELEFON AB L M (publ) | Coding of telecommunication systems and control messages in such systems |
| CN101237677B (zh) * | 2007-02-02 | 2010-09-08 | 华为技术有限公司 | 系统间切换时传递聚合最大位速率的方法、网络系统及目的侧网络 |
| CN101304600B (zh) | 2007-05-08 | 2011-12-07 | 华为技术有限公司 | 安全能力协商的方法及系统 |
| CN101309500B (zh) | 2007-05-15 | 2011-07-20 | 华为技术有限公司 | 不同无线接入技术间切换时安全协商的方法和装置 |
| CN101378591B (zh) * | 2007-08-31 | 2010-10-27 | 华为技术有限公司 | 终端移动时安全能力协商的方法、系统及装置 |
| CN101399767B (zh) | 2007-09-29 | 2011-04-20 | 华为技术有限公司 | 终端移动时安全能力协商的方法、系统及装置 |
| JP4435254B1 (ja) * | 2008-10-22 | 2010-03-17 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信方法及び交換局 |
| CN101938797A (zh) * | 2009-06-29 | 2011-01-05 | 大唐移动通信设备有限公司 | 一种获取用户设备无线能力信息的方法、装置和系统 |
| AU2011204099B2 (en) * | 2010-01-06 | 2015-11-05 | Lg Electronics Inc. | Mobile switching centre server |
| EP2537369B1 (en) * | 2010-02-15 | 2014-06-11 | Telefonaktiebolaget LM Ericsson (publ) | Context handling method |
| WO2011120218A1 (en) * | 2010-03-30 | 2011-10-06 | Huawei Technologies Co., Ltd. | Method for re-selecting a communication network |
| US8560830B2 (en) | 2010-04-06 | 2013-10-15 | Blackberry Limited | System and method for exchanging cryptographic protocol capabilities |
| EP2375674B1 (en) * | 2010-04-06 | 2014-11-26 | BlackBerry Limited | System and method for exchanging cryptographic protocol capabilities |
| TWI450557B (zh) * | 2010-04-15 | 2014-08-21 | Qualcomm Inc | 用於為通信期加密和完整性密鑰訊號傳遞增強型安全性上下文的裝置和方法 |
| US9197669B2 (en) | 2010-04-15 | 2015-11-24 | Qualcomm Incorporated | Apparatus and method for signaling enhanced security context for session encryption and integrity keys |
| US9084110B2 (en) | 2010-04-15 | 2015-07-14 | Qualcomm Incorporated | Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network |
| RU2525083C2 (ru) | 2010-04-16 | 2014-08-10 | Квэлкомм Инкорпорейтед | Устройство и способ перехода от обслуживающего сетевого узла, который поддерживает расширенный контекст безопасности к унаследованному обслуживающему сетевому узлу |
| CN102264067B (zh) * | 2010-05-26 | 2014-03-12 | 电信科学技术研究院 | 一种切换过程中安全功能的处理方法及设备 |
| CN102264065A (zh) * | 2010-05-27 | 2011-11-30 | 中兴通讯股份有限公司 | 一种实现接入层安全算法同步的方法及系统 |
| CN102833742B (zh) * | 2011-06-17 | 2016-03-30 | 华为技术有限公司 | 机器类通信设备组算法的协商方法和设备 |
| US8699461B2 (en) * | 2011-08-19 | 2014-04-15 | Hitachi, Ltd. | Optimized home evolved NodeB (eNB) handover in an LTE network |
| US8934913B2 (en) * | 2011-09-28 | 2015-01-13 | Telefonaktiebolaget L M Ericsson (Publ) | Enhanced mobility to home base station cells |
| CN102595369B (zh) * | 2012-02-29 | 2015-02-25 | 大唐移动通信设备有限公司 | 一种nas算法的传输方法及装置 |
| JP6135878B2 (ja) | 2012-05-04 | 2017-05-31 | ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. | ネットワークスイッチング中におけるセキュリティ処理方法およびシステム |
| US9603192B2 (en) | 2013-01-16 | 2017-03-21 | Ncore Communications, Inc. | Methods and apparatus for hybrid access to a core network |
| CN105519184B (zh) * | 2013-02-28 | 2019-06-28 | 华为技术有限公司 | 能力协商的方法、无线设备控制器和无线设备 |
| US9730074B2 (en) * | 2014-01-16 | 2017-08-08 | Telefonaktiebolaget Lm Ericsson (Publ) | System, methods and apparatuses for providing network access security control |
| WO2016049353A1 (en) * | 2014-09-25 | 2016-03-31 | Behzad Mohebbi | Methods and apparatus for hybrid access to a core network based on proxied authentication |
| WO2016049902A1 (zh) * | 2014-09-30 | 2016-04-07 | 华为技术有限公司 | 一种寻呼方法、相关设备及系统 |
| EP3567802A4 (en) * | 2017-01-26 | 2019-12-25 | Huawei Technologies Co., Ltd. | METHOD, DEVICE AND SYSTEM FOR PROTECTING DATA |
| CN109474927B (zh) * | 2017-09-08 | 2022-04-01 | 中国电信股份有限公司 | 信息交互方法、归属网络、用户终端以及信息交互系统 |
| US10512005B2 (en) | 2017-09-29 | 2019-12-17 | Nokia Technologies Oy | Security in intersystem mobility |
| CN109819492B (zh) * | 2017-11-20 | 2021-02-12 | 华为技术有限公司 | 一种确定安全能力的方法和装置 |
| DK3902302T3 (da) | 2018-02-19 | 2022-07-04 | Ericsson Telefon Ab L M | Understøtning af samarbejde og/eller mobilitet mellem forskellige trådløse kommunikationssystemer |
| US10716037B2 (en) * | 2018-10-11 | 2020-07-14 | International Business Machines Corporation | Assessment of machine learning performance with limited test data |
| EP3984191A1 (en) * | 2019-06-17 | 2022-04-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Key distribution for hop by hop security in iab networks |
| US20220286923A1 (en) * | 2019-08-14 | 2022-09-08 | Mediatek Singapore Pte. Ltd. | Apparatuses and methods for delivery of inter-system non-access stratum (nas) security algorithms |
| WO2021242168A1 (en) * | 2020-05-28 | 2021-12-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and radio network nodes for handling communication |
| US11902260B2 (en) * | 2021-08-02 | 2024-02-13 | Cisco Technology, Inc. | Securing control/user plane traffic |
| CN115002774B (zh) * | 2022-05-18 | 2025-01-24 | 太仓市同维电子有限公司 | 一种应用于5g小基站xn切换的多级安全算法 |
| EP4588264A4 (en) * | 2022-10-17 | 2025-08-20 | Samsung Electronics Co Ltd | Method and apparatus for selecting a selective security mode and flow management in a wireless communication system |
| WO2025000503A1 (zh) * | 2023-06-30 | 2025-01-02 | 华为技术有限公司 | 一种用户级同态加密管理方法及装置 |
| WO2025156438A1 (en) * | 2024-04-07 | 2025-07-31 | Zte Corporation | Techniques for security algorithm selection in handover from evolved packet system to 5g system |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1601943A (zh) * | 2003-09-25 | 2005-03-30 | 华为技术有限公司 | 一种选择安全通信算法的方法 |
| US20060026671A1 (en) | 2004-08-02 | 2006-02-02 | Darran Potter | Method and apparatus for determining authentication capabilities |
| CN1794682A (zh) * | 2005-07-11 | 2006-06-28 | 华为技术有限公司 | 一种在无线接入网中建立安全通道的方法 |
| CN1867185A (zh) * | 2006-01-24 | 2006-11-22 | 华为技术有限公司 | Sgsn间切换的实现方法 |
| US20070003062A1 (en) * | 2005-06-30 | 2007-01-04 | Lucent Technologies, Inc. | Method for distributing security keys during hand-off in a wireless communication system |
| WO2007025487A1 (en) | 2005-09-01 | 2007-03-08 | Huawei Technologies Co., Ltd. | A method for realizing handover between systems |
Family Cites Families (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5301280A (en) * | 1989-10-02 | 1994-04-05 | Data General Corporation | Capability based communication protocol |
| US6587680B1 (en) | 1999-11-23 | 2003-07-01 | Nokia Corporation | Transfer of security association during a mobile terminal handover |
| FI111423B (fi) * | 2000-11-28 | 2003-07-15 | Nokia Corp | Järjestelmä kanavanvaihdon jälkeen tapahtuvan tietoliikenteen salauksen varmistamiseksi |
| GB0104281D0 (en) * | 2001-02-21 | 2001-04-11 | Nokia Networks Oy | A communication system |
| GB2377589B (en) * | 2001-07-14 | 2005-06-01 | Motorola Inc | Ciphering keys for different cellular communication networks |
| US7020455B2 (en) * | 2001-11-28 | 2006-03-28 | Telefonaktiebolaget L M Ericsson (Publ) | Security reconfiguration in a universal mobile telecommunications system |
| AU2002357109A1 (en) | 2002-12-07 | 2004-06-30 | Richard A. Mowery Jr. | A power line communication network handoff |
| CN100388849C (zh) * | 2003-12-18 | 2008-05-14 | 中国电子科技集团公司第三十研究所 | 数字蜂窝移动通信系统用户切换时密钥的管理分配传递方法 |
| GB0329707D0 (en) * | 2003-12-22 | 2004-01-28 | Nokia Corp | Activation of services in a communication system |
| EP1763969B1 (en) * | 2004-07-02 | 2009-04-15 | NTT DoCoMo, Inc. | Method for secure handover |
| WO2006010953A2 (en) * | 2004-07-30 | 2006-02-02 | Andrew Richardson | A local network node |
| TWI393414B (zh) | 2005-07-06 | 2013-04-11 | Nokia Corp | 安全交談金鑰上下文 |
| KR100744374B1 (ko) * | 2005-07-15 | 2007-07-30 | 삼성전자주식회사 | 패킷 교환 기반의 네트워크에서 코어 네트워크 개체들 간의핸드오버 방법 및 장치 |
| US8553643B2 (en) * | 2005-07-19 | 2013-10-08 | Qualcomm Incorporated | Inter-system handover using legacy interface |
| US8515421B2 (en) * | 2005-11-12 | 2013-08-20 | Interdigital Technology Corporation | IMS enabled attach procedure for LTE |
| US20070153742A1 (en) * | 2006-01-03 | 2007-07-05 | Benoist Sebire | Method, apparatus, software, and system for handover |
| KR100929087B1 (ko) * | 2006-02-09 | 2009-11-30 | 삼성전자주식회사 | 이동통신 시스템에서 핸드오버시 업링크 타이밍싱크 프로시져 수행 방법 및 장치 |
| DK1989906T3 (en) * | 2006-02-28 | 2017-05-22 | Nokia Technologies Oy | COMMUNICATION NETWORK SUPPLY |
| WO2007103369A2 (en) * | 2006-03-07 | 2007-09-13 | Interdigital Technology Corporation | Method and apparatus for supporting handoff in an lte gtp based wireless communication system |
| EP1997269A4 (en) * | 2006-03-22 | 2014-01-08 | Lg Electronics Inc | ASYMMETRIC CRYPTOGRAPHY FOR WIRELESS SYSTEMS |
| EP1997294A4 (en) * | 2006-03-22 | 2014-08-27 | Lg Electronics Inc | SECURITY CONSIDERATIONS FOR UMTS LTE |
| US20080039096A1 (en) * | 2006-03-28 | 2008-02-14 | Nokia Corporation | Apparatus, method and computer program product providing secure distributed HO signaling for 3.9G with secure U-plane location update from source eNB |
| US7778226B2 (en) * | 2006-03-30 | 2010-08-17 | Intel Corporation | Device, system and method of coordination among multiple transceivers |
| US7697481B2 (en) * | 2006-03-31 | 2010-04-13 | Intel Corporation | Device, system and method of layer 2 handover between hereogenous networks |
| CN101411115B (zh) * | 2006-03-31 | 2012-06-06 | 三星电子株式会社 | 用于在接入系统间切换期间优化验证过程的系统和方法 |
| GB0606692D0 (en) * | 2006-04-03 | 2006-05-10 | Vodafone Plc | Telecommunications networks |
| TWM322686U (en) * | 2006-04-19 | 2007-11-21 | Interdigital Tech Corp | Apparatus for supporting routing area update procedures in a long term evolution general packet radio service tunneling protocol-based system |
| US8583929B2 (en) * | 2006-05-26 | 2013-11-12 | Alcatel Lucent | Encryption method for secure packet transmission |
| US20100061337A1 (en) * | 2006-06-16 | 2010-03-11 | Hallenstaal Magnus | Cell Selection/Reselection Mechanism for a Mobile Communication System |
| EP2052564B1 (en) * | 2006-08-18 | 2014-10-08 | Telefonaktiebolaget LM Ericsson (publ) | Intersystem change involving mapping between different types of radio bearers |
| US20080051084A1 (en) * | 2006-08-23 | 2008-02-28 | Alessio Casati | Telecommunications system and method for early transmission of data |
| FI20070095A0 (fi) * | 2007-02-02 | 2007-02-02 | Nokia Corp | Turva-avainten luominen langatonta viestintää varten |
| FI20070157A0 (fi) * | 2007-02-23 | 2007-02-23 | Nokia Corp | Nopea päivityssanomien autentikointi avainderivaatiolla mobiileissa IP-järjestelmissä |
| US8396477B2 (en) * | 2007-03-23 | 2013-03-12 | Panasonic Corporation | Radio communication base station device and radio communication method to shorten a suspension time of an MBMS service when a user equipment moves from a single frequency network area to a non-single frequency network area |
| US7773991B2 (en) * | 2007-04-02 | 2010-08-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Reducing access latency while protecting against control signaling data processing overload |
| CN101304600B (zh) * | 2007-05-08 | 2011-12-07 | 华为技术有限公司 | 安全能力协商的方法及系统 |
-
2007
- 2007-05-08 CN CN2007100743339A patent/CN101304600B/zh active Active
-
2008
- 2008-05-05 WO PCT/CN2008/070880 patent/WO2008134986A1/zh not_active Ceased
- 2008-05-05 EP EP19155180.3A patent/EP3554112B1/en active Active
- 2008-05-05 ES ES08734236.6T patent/ES2554808T3/es active Active
- 2008-05-05 EP EP08734236.6A patent/EP2117248B1/en active Active
- 2008-05-05 JP JP2009553896A patent/JP5010690B2/ja active Active
- 2008-05-05 EP EP15178977.3A patent/EP2966889B1/en active Active
-
2009
- 2009-07-16 US US12/503,942 patent/US8774759B2/en active Active
-
2014
- 2014-06-06 US US14/298,341 patent/US9668182B2/en active Active
-
2017
- 2017-04-24 US US15/495,607 patent/US10383017B2/en active Active
-
2019
- 2019-08-12 US US16/538,492 patent/US10958692B2/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1601943A (zh) * | 2003-09-25 | 2005-03-30 | 华为技术有限公司 | 一种选择安全通信算法的方法 |
| US20060026671A1 (en) | 2004-08-02 | 2006-02-02 | Darran Potter | Method and apparatus for determining authentication capabilities |
| US20070003062A1 (en) * | 2005-06-30 | 2007-01-04 | Lucent Technologies, Inc. | Method for distributing security keys during hand-off in a wireless communication system |
| CN1794682A (zh) * | 2005-07-11 | 2006-06-28 | 华为技术有限公司 | 一种在无线接入网中建立安全通道的方法 |
| WO2007025487A1 (en) | 2005-09-01 | 2007-03-08 | Huawei Technologies Co., Ltd. | A method for realizing handover between systems |
| CN1867185A (zh) * | 2006-01-24 | 2006-11-22 | 华为技术有限公司 | Sgsn间切换的实现方法 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2117248A4 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110419205A (zh) * | 2017-01-30 | 2019-11-05 | 瑞典爱立信有限公司 | 针对用户平面数据的完整性保护的方法 |
| CN110419205B (zh) * | 2017-01-30 | 2022-11-25 | 瑞典爱立信有限公司 | 针对用户平面数据的完整性保护的方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2117248A4 (en) | 2010-08-11 |
| CN101304600B (zh) | 2011-12-07 |
| US20200068467A1 (en) | 2020-02-27 |
| EP2117248B1 (en) | 2015-09-16 |
| EP2117248A1 (en) | 2009-11-11 |
| US10958692B2 (en) | 2021-03-23 |
| ES2554808T3 (es) | 2015-12-23 |
| US20180070275A1 (en) | 2018-03-08 |
| EP2966889A1 (en) | 2016-01-13 |
| JP2010521905A (ja) | 2010-06-24 |
| US20090275309A1 (en) | 2009-11-05 |
| JP5010690B2 (ja) | 2012-08-29 |
| US8774759B2 (en) | 2014-07-08 |
| CN101304600A (zh) | 2008-11-12 |
| US10383017B2 (en) | 2019-08-13 |
| EP3554112A1 (en) | 2019-10-16 |
| EP2966889B1 (en) | 2019-03-06 |
| US9668182B2 (en) | 2017-05-30 |
| EP3554112B1 (en) | 2022-03-02 |
| US20160150449A1 (en) | 2016-05-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2008134986A1 (en) | A method, system and device for security function negotiation | |
| CN201499311U (zh) | 能从分组交换域回退到电路交换域的无线发射/接收单元 | |
| US8755312B2 (en) | Apparatus and method for supporting gateway node reselection in communication system | |
| WO2010048868A1 (zh) | 一种网络切换的方法、系统和装置 | |
| WO2009006774A1 (fr) | Procédé de transfert intérieur dans un système | |
| CN101754191A (zh) | 处理交递保密设定的方法及其相关通讯装置 | |
| US10841848B2 (en) | Communication method, user equipment, base station, control plane network element, and communications system | |
| WO2009000197A1 (en) | Method and network equipment for establishing and deleting resource | |
| WO2008113235A1 (en) | A method for avoiding resourece being released mistakenly during tracking area update or handover process | |
| WO2020052613A1 (zh) | 切换方法和终端设备 | |
| CN105874766A (zh) | 用户设备之间的受控证书提供 | |
| WO2019196785A1 (zh) | 语音切换方法和装置、终端及存储介质 | |
| WO2013086949A1 (zh) | 一种通信方法及设备 | |
| WO2011110001A1 (zh) | 承载建立方法、系统和网关设备 | |
| EP2685751B1 (en) | Handover method, base station, user equipment and mobility management entity | |
| CN102413461B (zh) | 安全能力协商的方法及系统 | |
| WO2009127120A1 (zh) | 切换过程中跟踪用户的方法、装置及系统 | |
| WO2014022974A1 (zh) | 数据发送的方法、设备及系统 | |
| TW202329748A (zh) | 多重存取協定資料單元會話處理方法 | |
| WO2015123945A1 (zh) | 最优路径的建立方法、mme及网关、计算机存储介质 | |
| TW202337264A (zh) | 增強系統交互工作的會話連續性的方法與設備 | |
| CN105379379A (zh) | 用于专用移动无线电服务的节点和方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08734236 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2008734236 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2009553896 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |