[go: up one dir, main page]

WO2018137352A1 - Procédé de vérification de réseau, équipement utilisateur, nœud d'authentification de réseau et système - Google Patents

Procédé de vérification de réseau, équipement utilisateur, nœud d'authentification de réseau et système Download PDF

Info

Publication number
WO2018137352A1
WO2018137352A1 PCT/CN2017/103241 CN2017103241W WO2018137352A1 WO 2018137352 A1 WO2018137352 A1 WO 2018137352A1 CN 2017103241 W CN2017103241 W CN 2017103241W WO 2018137352 A1 WO2018137352 A1 WO 2018137352A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
user equipment
authentication
network authentication
pvt
Prior art date
Application number
PCT/CN2017/103241
Other languages
English (en)
Chinese (zh)
Inventor
王海光
康鑫
时杰
杨艳江
雷中定
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018137352A1 publication Critical patent/WO2018137352A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a network authentication method, a user equipment, a network authentication node, and a system.
  • Network authentication between the network authentication node and the user equipment is one of the important links to ensure the normal operation of the communication network.
  • the EAP authentication framework supports a variety of EAP-based authentication protocols, such as EAP Transport Lay Protocol (EAP-TLS), and EAP Tunneled Transport Lay Protocol (EAP-EAP-based). TTLS), EAP-based shared key authentication method (EAP Pre-Shared Key, EAP-PSK).
  • EAP-TLS EAP Transport Lay Protocol
  • EAP-EAP-based EAP Tunneled Transport Lay Protocol
  • TTLS EAP-based shared key authentication method
  • EAP Pre-Shared Key EAP Pre-Shared Key
  • 3GPP SA3 is also investigating the use of different cryptographic techniques for network authentication, including traditional Public Key Infrastructure (PKI) authentication techniques and new identity-based cryptography. (Identity Based Cryptography, IBC) certification technology. PKI-based technology has been supported in a variety of authentication technologies after years of research and protocol design.
  • PKI Public Key Infrastructure
  • IBC Identity Based Cryptography
  • IBC authentication technology provides an identity-based encryption and signature method and is a public key technology. Different from the PKI technology, when the key generation is performed by using the IBC public key technology, a common key center is combined with the ICC public key pre-configured by the key center according to the received identity information (Identification, ID) information of the user equipment.
  • the global parameters of the technology that is, the global private key and the public key of the key center, generate a private key corresponding to the user equipment ID for the user equipment and send it to the user equipment through the secure channel.
  • the user equipment ID in the IBC public key technology is the public key. Therefore, it is not necessary to carry information such as the public key and signature necessary for the certificate, and therefore, it has the advantage of being short in length with respect to the certificate.
  • the embodiment of the present application provides a network authentication method, a user equipment, a network authentication node, and a system, so that the IBC public key technology can match an existing protocol of the EAP.
  • the first aspect provides a network authentication system, where the network authentication system includes a user equipment and a network authentication node, where: the user equipment sends an authentication type indication information, an ID of the user equipment, and the The PVT of the user equipment, the authentication type indication information is used to indicate that the user equipment needs to perform identity-based cryptography and shared key EAP-PSK authentication of the scalable authentication protocol.
  • the network authentication node is configured to receive the authentication type indication information, the ID information of the user equipment, and the PVT of the user equipment, where the user equipment is determined according to the authentication type indication information. An identity-based cryptography and EAP-PSK authentication are required, and the ID of the network authentication node and the PVT of the network authentication node are sent to the user equipment.
  • the network authentication node generates a network authentication node symmetric key according to the ID of the user equipment, the PVT of the user equipment, and the private key and the global public key based on the identity of the network authentication node, according to the network authentication node symmetrically
  • the key generates a second authentication key and a second key deduction key, and performs EAP-PSK authentication with the user equipment by using the second authentication key and the second key derivation key.
  • the user equipment generates a symmetric key of the user equipment according to the ID of the network authentication node, the PVT of the network authentication node, and the IBC identity information based on the private key of the user equipment and the global public key, and the network authentication.
  • the node generates a symmetric key of the network authentication node according to the ID of the user equipment, the PVT of the user equipment, and the IBC identity information such as the private key of the network authentication node and the global public key.
  • the user equipment and the network authentication node use the symmetric key generated by the user as the pre-shared key, which enables the mutual authentication using the EAP-PSK-based authentication method without changing the EAP-PSK authentication protocol interaction and its format.
  • IBC-based interactive authentication is performed on the existing work of 3GPP and its supported EAP authentication framework, so that the IBC public key technology can match the existing protocols of EAP.
  • the user equipment generates the first authentication key and the first key deduction key according to the user equipment symmetric key in a manner that the network authentication node is further configured to send the The private key expiration date information of the network authentication node, so that the user equipment can further generate the first authentication key and the first secret according to the user equipment symmetric key, the private key expiration date information of the user equipment, and the network authentication node private key expiration date information. Key deduction key.
  • the symmetric key generates a first authentication key and a first key derivation key.
  • the user equipment generates a first authentication key and the first according to at least one of a random number generated by the user equipment and a received random number generated by the network authentication node, and the user equipment symmetric key. Key derivation key.
  • the network authentication node generates a second authentication key and a second key deduction key according to the network authentication node symmetric key, and the user equipment is further configured to send the private key expiration date information of the user equipment,
  • the network authentication node may further generate the second authentication key and the second key deduction key according to the network authentication node symmetric key, the private key expiration date information of the network authentication node, and the private key expiration date information of the user equipment.
  • the network authentication node generates a second authentication key according to at least one of a random number generated by the network authentication node and a received random number generated by the user equipment, and the network authentication node symmetric key. The second key derivation key.
  • the authentication type indication information may be an authentication request including an EAP-PSK flag bit and a symmetric key for indicating an identity-based cryptography. Or the authentication type indication information may also be an ID of the user equipment and a PVT of the user equipment.
  • the user equipment may send the authentication type indication information, the ID of the user equipment, and the PVT of the user equipment by using the access request information. User device and private key expiration date information of the user device. Or the user equipment may send the authentication type indication information by using the access request information, and send the ID of the user equipment and the PVT of the user equipment by using a second message of the EAP-PSK authentication protocol.
  • the user equipment may send the authentication type indication information, the ID of the user equipment, the PVT of the user equipment, and the private key expiration date information of the user equipment by using the access request information.
  • the user equipment may send the authentication type indication information by using the access request information, and send the ID of the user equipment, the PVT of the user equipment, and the private information of the user equipment by using a second message of the EAP-PSK authentication protocol. Key expiration date information.
  • the network authentication node may send the ID of the network authentication node and the PVT of the network authentication node by using a first message of the EAP-PSK authentication protocol.
  • the network authentication node may send the ID of the network authentication node, the PVT of the network authentication node, and the private key expiration date information of the network authentication node by using a first message of the EAP-PSK authentication protocol.
  • the K_UE is the user equipment symmetric key
  • the SSK_UE is the private key of the user equipment
  • the KPAK is the global public key
  • the ID_AUSF is the identifier of the network authentication node
  • the PVT_AUSF is the PVT of the network authentication node
  • the K_AUSF is the network authentication node symmetric key
  • SSK_AUSF For the private key of the network authentication node
  • KPAK is the global public key
  • ID_UE is the identifier of the user equipment
  • PVT_UE is the PVT of the user equipment
  • G is the elliptic curve generator
  • [x]P is the point multiplication of the point P on the elliptic curve. Where x represents an integer, P represents a point on the elliptic curve, hash() represents a cryptographically meaningful hash function, and the
  • symbol represents a character connection.
  • the second aspect provides a user equipment, where the user equipment includes a sending unit, a receiving unit, and an authentication unit, where the sending unit is configured to send, to the network authentication node, the authentication type indication information, the ID of the user equipment, and the The PVT of the user equipment is used to indicate that the user equipment needs to perform identity-based cryptography and a shared key EAP-PSK authentication of the scalable authentication protocol.
  • the receiving unit is configured to receive an ID of the network authentication node sent by the network authentication node and a PVT of the network authentication node.
  • the authentication unit is configured to: according to an ID of the network authentication node, a PVT of the network authentication node, and based on the user equipment Generating a user equipment symmetric key by the private key of the identity and the global public key, generating a first authentication key and a first key derivation key according to the symmetric key of the user equipment, and using the first authentication key and the first key
  • the derivation key and the network authentication node perform EAP-PSK authentication.
  • the sending unit sends the authentication type indication information, the ID of the user equipment, and the PVT of the user equipment by using the access request information, or sending the authentication type indication information by using the access request information, and adopting EAP-PSK authentication.
  • the second message of the protocol sends the ID of the user equipment and the PVT of the user equipment.
  • the user equipment sends the authentication type indication information, the ID of the user equipment, and the PVT of the user equipment to the network authentication node, and receives the ID and location of the network authentication node sent by the network authentication node.
  • the PVT of the network authentication node is generated, so that the symmetric key of the user equipment can be generated according to the ID of the network authentication node, the PVT of the network authentication node, and the IBC identity information based on the private key of the user equipment and the global public key.
  • the authentication unit generates a first authentication key and a first key deduction key according to the user equipment symmetric key in the following manner:
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and an identity-based cryptographic technique for generating a symmetric key, or the authentication type indication information is the user equipment. ID and PVT of the user equipment.
  • the sending unit is further configured to send private key expiration date information of the user equipment
  • the sending unit sends the authentication type indication information, the ID of the user equipment, the PVT of the user equipment, and the private key expiration date information of the user equipment by using the access request information; or sending the request information through the access request information.
  • the authentication type indication information is sent by the second message of the EAP-PSK authentication protocol, the ID of the user equipment, the PVT of the user equipment, and the private key expiration date information of the user equipment.
  • the K_UE is the user equipment symmetric key
  • the SSK_UE is the private key of the user equipment
  • the KPAK is the global public key
  • the ID_AUSF is the identifier of the network authentication node
  • the PVT_AUSF is the PVT of the network authentication node
  • the G is the elliptic curve generation element
  • [x] P represents the point multiplication for the point P on the elliptic curve, where x represents an integer
  • P represents a point on the elliptic curve
  • hash() represents a cryptographically meaningful hash function
  • symbol represents a character connection.
  • a network authentication node comprising a receiving unit, a sending unit, and an authentication unit.
  • the receiving unit is configured to receive the authentication type indication information sent by the user equipment, the ID information of the user equipment, and the PVT of the user equipment.
  • the sending unit configured to send, according to the authentication type indication information, that the user equipment needs to perform identity-based key technology and EAP-PSK authentication, send the network authentication node to the user equipment ID and PVT of the network authentication node.
  • the authentication unit And generating a network authentication node symmetric key according to the ID of the user equipment, a PVT of the user equipment, and a private key and a global public key based on the identity of the network authentication node, according to the symmetric key generation of the network authentication node.
  • the second authentication key and the second key derivation key are used to perform EAP-PSK authentication with the user equipment using the second authentication key and the second key derivation key.
  • the sending unit sends the ID of the network authentication node and the PVT of the network authentication node by using a first message of the EAP-PSK authentication protocol.
  • the network authentication node receives the authentication type indication information sent by the user equipment, the ID information of the user equipment, and the PVT of the user equipment, according to the ID of the user equipment, and the PVT of the user equipment. And generating a network authentication node symmetric key based on the private key and the global public key of the network authentication node identity, using the generated symmetric key as a pre-shared key, and generating a second authentication key according to the network authentication node symmetric key Deriving a key with the second key, and performing EAP-PSK authentication with the user equipment by using the second authentication key and the second key derivation key, which can implement the interaction without changing the EAP-PSK authentication protocol and its format.
  • the EAP-PSK-based authentication method is used to implement mutual authentication to perform IBC-based interactive authentication on the existing 3GPP work and the supported EAP authentication framework, so that the IBC public key technology can match the existing EAP protocol. .
  • the authentication unit generates a second authentication key and a second key deduction key according to the network authentication node symmetric key in the following manner:
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and an identity-based cryptographic technique for generating a symmetric key, or the authentication type indication information is the user equipment. ID and PVT of the user equipment.
  • the sending unit is further configured to send private key expiration date information of the network authentication node. And sending, by the first message of the EAP-PSK authentication protocol, the sending unit, the ID of the network authentication node, the PVT of the network authentication node, and the private key expiration date information of the network authentication node.
  • the K_AUSF is the network authentication node symmetric key
  • the SSK_AUSF is the private key of the network authentication node
  • the KPAK is the global public key
  • the ID_UE is the identifier of the user equipment
  • the PVT_UE is the PVT of the user equipment
  • the G is the elliptic curve generation element
  • [x] P represents the point multiplication for the point P on the elliptic curve, where x represents an integer
  • P represents a point on the elliptic curve
  • hash() represents a cryptographically meaningful hash function
  • symbol represents a character connection.
  • a fourth aspect provides a network authentication method, in which a user equipment sends an authentication type indication information, an ID of the user equipment, and a PVT of the user equipment to a network authentication node, where the authentication type indication information is used.
  • the user equipment is instructed to perform shared key EAP-PSK authentication using an identity-based cryptographic technique and an extensible authentication protocol.
  • the network authentication node receives the authentication type indication information sent by the user equipment, the identity identifier ID information of the user equipment, and the public key authentication token PVT of the user equipment. If the network authentication node determines that the user equipment needs to perform the shared key EAP-PSK authentication of the identity-based cryptography and the scalable authentication protocol according to the authentication type indication information, send the network authentication to the user equipment.
  • the ID of the node and the PVT of the network authentication node Receiving, by the user equipment, an ID of the network authentication node sent by the network authentication node And a PVT of the network authentication node.
  • the user equipment generates a user equipment symmetric key according to the ID of the network authentication node, the PVT of the network authentication node, and the private key and the global public key based on the identity of the user equipment, and according to the symmetric key of the user equipment Generating a first authentication key and a first key derivation key, and performing EAP-PSK authentication with the network authentication node using the first authentication key and the first key derivation key.
  • the network authentication node generates a network authentication node symmetric key according to the ID of the user equipment, the PVT of the user equipment, and the private key and the global public key based on the identity of the network authentication node, according to the network authentication node symmetrically
  • the key generates a second authentication key and a second key deduction key, and performs EAP-PSK authentication with the user equipment by using the second authentication key and the second key derivation key.
  • the user equipment sends the authentication type indication information, the ID of the user equipment, and the PVT of the user equipment by using the access request information. Or the user equipment sends the authentication type indication information by using the access request information, and sends the ID of the user equipment and the PVT of the user equipment by using a second message of the EAP-PSK authentication protocol.
  • the network authentication node sends the ID of the network authentication node and the PVT of the network authentication node by using a first message of the EAP-PSK authentication protocol.
  • the generating the first authentication key and the first key derivation key according to the user equipment symmetric key comprises: receiving a private key of the network authentication node sent by the network authentication node
  • the expiration date information is generated according to the private key expiration date information of the user equipment, the private key expiration date information of the network authentication node, and the user equipment symmetric key, to generate a first authentication key and a first key derivation key.
  • the generating the second authentication key and the second key derivation key according to the network authentication node symmetric key includes: receiving the private key of the user equipment sent by the user equipment
  • the expiration date information generates a second authentication key and a second key deduction key according to the private key expiration date information of the network authentication node, the private key expiration date information of the user equipment, and the network authentication node symmetric key.
  • generating a second authentication key and a second key deduction according to at least one of a random number generated by the network authentication node and the received random number generated by the user equipment, and the network authentication node symmetric key Key is generating a second authentication key and a second key deduction according to at least one of a random number generated by the network authentication node and the received random number generated by the user equipment, and the network authentication node symmetric key Key.
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and is used to generate a symmetric key based on the identity signature, or the authentication type indication information is an ID of the user equipment and a PVT of the user equipment. .
  • the user equipment sends the authentication type indication information, the ID of the user equipment, the PVT of the user equipment, and the private key expiration date information of the user equipment by using the access request information.
  • the user equipment sends the authentication type indication information by using the access request information, and sends the ID of the user equipment, the PVT of the user equipment, and the private key of the user equipment expired by using the second message of the EAP-PSK authentication protocol. Date information.
  • the network authentication node sends the ID of the network authentication node, the PVT of the network authentication node, and the private key of the network authentication node by using the first message of the EAP-PSK authentication protocol. Expiration date information.
  • the K_UE is the user equipment symmetric key
  • the SSK_UE is the private key of the user equipment
  • the KPAK is the global public key
  • the ID_AUSF is the identifier of the network authentication node
  • the PVT_AUSF is the PVT of the network authentication node
  • the G is the elliptic curve generation element
  • [x] P represents the point multiplication for the point P on the elliptic curve, where x represents an integer
  • P represents a point on the elliptic curve
  • hash() represents a cryptographically meaningful hash function
  • symbol represents a character connection.
  • the K_AUSF is the network authentication node symmetric key
  • the SSK_AUSF is the private key of the network authentication node
  • the KPAK is the global public key
  • the ID_UE is the identifier of the user equipment
  • the PVT_UE is the PVT of the user equipment
  • the G is the elliptic curve generation element
  • [x] P represents the point multiplication for the point P on the elliptic curve, where x represents an integer
  • P represents a point on the elliptic curve
  • hash() represents a cryptographically meaningful hash function
  • symbol represents a character connection.
  • the user equipment generates a symmetric key of the user equipment according to the ID of the network authentication node, the PVT of the network authentication node, and the IBC identity information based on the private key of the user equipment and the global public key, and the network authentication.
  • the node generates a symmetric key of the network authentication node according to the ID of the user equipment, the PVT of the user equipment, and the IBC identity information such as the private key of the network authentication node and the global public key.
  • the user equipment and the network authentication node use the symmetric key generated by the user as the pre-shared key, which enables the mutual authentication using the EAP-PSK-based authentication method without changing the EAP-PSK authentication protocol interaction and its format.
  • IBC-based interactive authentication is performed on the existing work of 3GPP and its supported EAP authentication framework, so that the IBC public key technology can match the existing protocols of EAP.
  • FIG. 1 is a schematic structural diagram of a network authentication system according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of an EAP-based authentication framework in the prior art
  • FIG. 4 is a schematic structural diagram of a network authentication system according to an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a communication apparatus according to an embodiment of the present application.
  • FIG. 6 is a flowchart of a network authentication interaction according to an embodiment of the present application.
  • FIG. 7 is a flowchart of an implementation of a first embodiment according to an embodiment of the present disclosure.
  • FIG. 8 is a flowchart of an implementation of a second embodiment according to an embodiment of the present disclosure.
  • FIG. 9 is a flowchart of an implementation of a third embodiment according to an embodiment of the present disclosure.
  • FIG. 10 is a flowchart of an implementation of a fourth embodiment according to an embodiment of the present disclosure.
  • FIG. 11 is a flowchart of an implementation of a fifth embodiment according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of a user equipment and a network authentication node according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic structural diagram of a network authentication system according to an embodiment of the present application.
  • the network authentication system 100 can include a user equipment 10, a network authentication node 20 (such as an Authentication Server Function (AUSF)), a Security Anchor Function (SEAF) 30, and an authentication context storage and processing.
  • AUSF Authentication Server Function
  • SEAF Security Anchor Function
  • ARPF Authentication Credential Repository and Processing Function
  • the user equipment 10 may include a user terminal such as a mobile phone, a tablet computer, a notebook computer, a mobile Internet device (MID), a wearable device (such as a smart watch, a smart bracelet, a pedometer, etc.), and may also include IoT devices can also include other communication devices.
  • a user terminal such as a mobile phone, a tablet computer, a notebook computer, a mobile Internet device (MID), a wearable device (such as a smart watch, a smart bracelet, a pedometer, etc.), and may also include IoT devices can
  • the AUSF provides network authentication services for all users accessing the network and interacts with ARPF and SEAF. It is the endpoint for receiving the request information of the SEAF, and can also be configured in a third-party system.
  • SEAF is used for authentication network functions. Mainly interacts with AUSF and user equipment. For AKA authentication, SEAF receives the intermediate key from the AUSF and is responsible for session key management of the user equipment.
  • ARPF storage is used for The network function of the long-term security context of authentication and encryption algorithms can also be used to store security-related user profiles.
  • the various network function nodes (such as SEAF, AUSF, ARPF, etc.) shown in FIG. 1 are the names appearing in the current 3GPP SA3 Standard Organization Document and Technical Report (TR), and these names may be changed, such as Renaming, network function merging, splitting, etc., the application is not limited to the names of these network function nodes and which network elements are specifically configured in these network elements. The same applies to other network elements that implement similar functions.
  • the user equipment 10 can perform mutual authentication with the AUSF by using an access network element such as a base station (NodeB), a base station controller (Radio Network Controller, RNC) or an access gateway that provides the network access service function for the user equipment 10. .
  • an access network element such as a base station (NodeB), a base station controller (Radio Network Controller, RNC) or an access gateway that provides the network access service function for the user equipment 10.
  • RNC Radio Network Controller
  • the following embodiments of the present application mainly describe an interactive authentication process between the user equipment 10 and the network authentication node 20.
  • the EAP-PSK interactive authentication may be performed between the user equipment 10 and the network authentication node 20 based on the EAP-PSK protocol supported by the EAP-based authentication framework.
  • Figure 2 shows a schematic diagram of an EAP-based authentication framework.
  • the EAP-based authentication framework is mainly composed of three entities, namely, an authentication request client (Supplicant) on the user equipment side, an authentication node (Authenticator) on the access network, and an authentication server (Server) on the network side.
  • Supplicant is the entity responsible for running the EAP authentication protocol framework on the terminal side. It contains the interface with the key storage entity.
  • the Authenticator is responsible for the relay of authentication messages and the distribution of session keys.
  • the server is responsible for network side authentication.
  • FIG. 3 is a flowchart showing an implementation of EAP-PSK interactive authentication between the user equipment 10 and the network authentication node 20 in the prior art. See Figure 3, including:
  • the network authentication node 20 sends a first message to the user equipment 10, where the first message includes a random number (RAND_S) and identification information (ID_S) of the network authentication node 20.
  • RAND_S random number
  • ID_S identification information
  • the user equipment 10 sends a second message to the network authentication node 20, where the second message includes a random number (RAND_S) generated by the network authentication node 20, and a random number (RAND_P) generated by the user equipment 10 and the user equipment 10 Identification information (ID_P).
  • RAND_S random number
  • RAND_P random number generated by the user equipment 10 and the user equipment 10 Identification information
  • the network authentication node 20 sends a third message, where the third message includes a message authentication code (MAC) generated by using the pre-shared key for the third message, and is used for user equipment 10 authentication.
  • the network authentication node 20 can be represented as MAC_S.
  • S104 After the user equipment 10 receives the third message sent by the network authentication node 20, the user equipment 10 generates and sends a fourth message, where the fourth message also includes a MAC generated by using the pre-shared key. The user equipment 10 is authenticated by the network authentication node 20.
  • the user equipment 10 and the network authentication node 20 use the random number and its pre-shared key contained in the interactive information to generate a session key for the user equipment 10 and the network authentication node 20 to use in subsequent communications.
  • the specific session key generation method can be found in RFC 4764.
  • the user equipment 10 and the network authentication node 20 may also perform mutual authentication based on the IBC public key technology.
  • the key center owns the private key s, and generates a global public key (KPAK) using the private key and global parameters, and generates a signature for the user equipment 10 when the key center generates a signature.
  • KPAK global public key
  • the key center In the case of the private key, the key center generates a random number first, and then uses the random number and the ID of the user equipment 10, and other global parameters, to generate a private key (SSK) for the user equipment 10, and To use the random number, a Public Key Authentication Token (PVT) is generated, and the SSK, PVT, and KPAK are sent to the user equipment 10 in combination.
  • the user equipment 10 signs the message using the SSK and sends the signed message to the network authentication node 20, the signed message containing the user's ID and its PVT.
  • Network authentication node 20 can use the KPAK saved by itself, and the received ID of the user equipment 10 and the PVT verify the signature of the message.
  • the user equipment 10 and the network authentication node 20 use the above method to perform the mutual authentication process.
  • the "multiple authentication methods supported by the EAP do not support the authentication based on the IBC public key technology, and therefore cannot be implemented in the 3GPP.
  • the interaction authentication method provided by the embodiment of the present application in combination with the authentication method based on the IBC public key technology and the EAP-PSK-based authentication mode, the user equipment 10 and the network authentication node 20 generate a symmetric key when having an IBC identity and a key. Key, and the symmetric key is used as a pre-shared key. If the EAP-PSK authentication protocol interaction and its format are not changed, the EAP-PSK-based authentication method is used to implement mutual authentication, so as to work in 3GPP and its The IBC-based interactive authentication is performed on the supported EAP authentication framework, so that the IBC public key technology can match the existing protocols of EAP.
  • the architecture diagram of the network authentication system composed of the user equipment 10 and the network authentication node 20 that implements the mutual authentication based on the authentication method of the IBC public key technology and the EAP-PSK-based authentication method can be as shown in FIG. 4 .
  • the user equipment 10 and the network authentication node 20 can be functionally divided into an IBC module and an EAP-PSK module.
  • the IBC module can be used for the management and storage of keys such as SSK, PVT, KPAK, ID and its expiration date, as well as receiving the ID, expiration date and PVT sent by the peer, and the received ID and its expiration.
  • the PVT or the like performs a legality check.
  • the IBC module of the user equipment 10 can determine whether the received ID is the ID of the network authentication node 20, and whether the date has expired or the like.
  • the IBC module can also be used to generate a symmetric key based on the peer IBC parameters provided by the EAP-PSK module, such as ID, expiration date and PVT, and send the symmetric key to the EAP-PSK module.
  • the functions of the EAP-PSK module include: generation and transmission of EAP-PSK authentication messages, encapsulation of IBC-based parameters such as ID, expiration date, PVT, etc. in EAP-PSK-based messages, and from EAP-PSK messages
  • the IBC-based parameters such as ID, expiration date, PVT, etc. are sent to the IBC module.
  • the symmetric key generated by the IBC module is used for authentication.
  • the session key is further generated according to the key generated after the authentication, and the peer end performs EAP-PSK authentication.
  • the communication device (or system) 300 can include at least one processor 301, a memory 303, and at least one communication interface 304. These components can communicate over one or more communication buses 302.
  • FIG. 5 is only an implementation manner of the embodiment of the present application.
  • the communication device 300 may further include more or fewer components, which are not limited herein.
  • Communication interface 304 is for receiving and transmitting radio frequency signals, coupled to the receiver and transmitter of communication device 300.
  • the communication interface 304 communicates with the communication network and other communication devices through radio frequency signals, such as Ethernet, Radio Access Technology (RAN), Wireless Local Area Networks (WLAN), and the like.
  • the communication protocol supported by the communication interface 304 may include, but is not limited to, 2G/3G, Long Term Evolution (LTE), Wireless-Fidelity (Wi-Fi), and 5G new radio (New Radio). , NR) and so on.
  • Memory 303 is coupled to processor 301 for storing various software programs and/or sets of instructions.
  • memory 303 can include high speed random access memory, and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
  • the memory 303 can store an operating system (hereinafter referred to as a system) such as an embedded operating system such as ANDROID, IOS, WINDOWS, or LINUX.
  • the memory 303 can be used to store implementations of embodiments of the present application.
  • the memory 303 can also store a network communication program that can be used with one or more additional devices, one or more terminal devices, one or more network devices Prepare for communication.
  • the processor 301 can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • communication device 300 can also include an output device 305 and an input device 306.
  • Output device 305 is in communication with processor 301 and can display information in a variety of ways.
  • the output device 305 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector.
  • Input device 306 is in communication with processor 301 and can receive user input in a variety of ways.
  • input device 306 can be a mouse, keyboard, touch screen device, or sensing device, and the like.
  • the memory 303 may also store a user interface program, which can realistically display the content of the application through a graphical operation interface.
  • the user receives control of the application through input controls such as menus, dialog boxes, and buttons.
  • the communication device 300 shown in FIG. 5 is implemented as the user equipment 10 shown in FIG. 4, one or more software modules may be stored in the memory of the communication device 300, which may be used to provide an access request, generate a symmetric key, and authenticate the user.
  • the communication device 300 shown in FIG. 5 is implemented as the network authentication node 20 shown in FIG. 4
  • one or more software modules may be stored in the memory of the communication device 300, which may be used to provide a symmetric key and access user legitimacy.
  • the following method embodiments For details, refer to the following method embodiments.
  • the following method embodiments refer to the following method embodiments.
  • the implementation method of the mutual authentication by the user equipment 10 and the network authentication node 20 in combination with the authentication method based on the IBC public key technology and the EAP-PSK based authentication method will be described below.
  • FIG. 6 is a flowchart of a network authentication interaction provided by an embodiment of the present application. See Figure 6, which includes:
  • the user equipment 10 sends the authentication type indication information, the ID of the user equipment 10, and the PVT of the user equipment 10 to the network authentication node 20, where the authentication type indication information is used to indicate that the user equipment 10 needs to perform identity-based Cryptography and EAP-PSK certification.
  • the authentication type indication information may be sent by using the access request information.
  • the ID of the user equipment 10 and the PVT of the user equipment 10 may be sent by using the access request information, or may be sent by the second message of the EAP-PSK authentication protocol.
  • the network authentication node 20 receives the authentication type indication information, the ID information of the user equipment 10, and the PVT of the user equipment 10, and determines the user according to the authentication type indication information. Whether the device 10 needs to perform identity-based cryptography and EAP-PSK authentication.
  • S203 and S204 may be performed.
  • the network authentication node 20 is configured according to the ID of the user equipment 10 and the PVT of the user equipment 10 Generating a network authentication node 20 symmetric key based on the private key and the global public key of the network authentication node 20, and generating a second authentication key and a second key deduction key according to the network authentication node 20 symmetric key. .
  • the user equipment 10 may further send the private key expiration date information of the user equipment 10, so that the network authentication node 20 may according to the network authentication node 20 symmetric key and the private key expiration date information of the network authentication node 20 And the private key expiration date information of the user equipment 10 further generates a second authentication key and a second key deduction key.
  • the user equipment 10 may send the private key expiration date information of the user equipment 10 through the access request information, or may send the private key expiration date information of the user equipment 10 through the second message of the EAP-PSK authentication protocol.
  • the user equipment 10 may be based on at least one of a random number generated by the user equipment 10 and a received random number generated by the network authentication node 20, and the user equipment 10 is symmetric.
  • the key and further generate an authentication key and a key derivation key.
  • the network authentication node 20 sends the ID of the network authentication node 20 and the PVT of the network authentication node 20 to the user equipment 10.
  • the network authentication node 20 may send the ID of the network authentication node 20 and the PVT of the network authentication node 20 through the first message of the EAP-PSK authentication protocol.
  • the user equipment 10 receives the ID of the network authentication node 20 and the PVT of the network authentication node 20 sent by the network authentication node 20, according to the ID of the network authentication node 20, the network authentication node 20
  • the PVT and the private key and the global public key based on the identity of the user equipment 10 generate a symmetric key of the user equipment 10, and generate a first authentication key and a first key deduction key according to the symmetric key of the user equipment 10, EAP-PSK authentication is performed with the network authentication node 20.
  • the network authentication node 20 may also send the private key expiration date information of the network authentication node 20, so that the user equipment 10 may be based on the user equipment 10 symmetric key, the user equipment 10 private key expiration date information, and the network.
  • the authentication node 20 private key expiration date information further generates a first authentication key and a first key derivation key.
  • the network authentication node 20 may send the private key expiration date information of the network authentication node 20 through the first message of the EAP-PSK authentication protocol.
  • the network authentication node 20 may further generate, according to the random number generated by the network authentication node 20 and the received random number sum generated by the user equipment 10, and the network.
  • the authentication node 20 symmetrically keys and further generates a second authentication key and a second key deduction key.
  • S206 The user equipment 10 and the network authentication node 20 perform EAP-PSK authentication using the first authentication key and the first key derivation key.
  • the network authentication node 20 and the user equipment 10 perform EAP-PSK authentication using the second authentication key and the second key derivation key.
  • the "first" and “second" authentication keys and the key derivation key are conveniently described, and the symmetric key generated by the user equipment is referred to as a user equipment symmetric key.
  • the symmetric key generated by the network authentication node is referred to as a network authentication node symmetric key, and is only used to distinguish whether the keys are generated by the user equipment 10 or generated by the network authentication node 20, and the specific name is not limited. .
  • the user equipment 10 performs EAP-PSK authentication with the network authentication node 20, If the authentication is passed, the user equipment symmetric key is the same as the network authentication node symmetric key, the first authentication key is the same as the second authentication key, and the first key derivation key is the same as the second key deduction key.
  • the user equipment 10 generates the symmetry of the user equipment 10 according to the ID of the network authentication node 20, the PVT of the network authentication node 20, and the IBC identity information based on the private key of the user equipment 10 and the global public key.
  • the key, the network authentication node 20 generates a symmetric key of the network authentication node 20 according to the ID of the user equipment 10, the PVT of the user equipment 10, and the IBC identity information of the network authentication node 20 itself and the global public key.
  • the user equipment 10 and the network authentication node 20 use the symmetric key generated by the user as the pre-shared key, and can implement the mutual authentication by using the EAP-PSK-based authentication method without changing the EAP-PSK authentication protocol interaction and its format.
  • IBC-based interactive authentication is performed on the existing work of 3GPP and its supported EAP authentication framework, so that IBC public key technology can match the existing protocols of EAP.
  • the following describes the process of implementing the interactive authentication by using the IBC public key technology-based authentication method and the EAP-PSK-based authentication method according to the present application in conjunction with a specific embodiment.
  • the user equipment 10 is a UE
  • the network authentication node 20 is an AUSF as an example.
  • FIG. 7 is a flowchart of an implementation of a first embodiment provided by the present application. Referring to FIG. 7, the method includes:
  • S301 The UE sends an access request message (Attach) to the AUSF.
  • the access request message sent by the UE to the AUSF includes the authentication type indication information, where the authentication type indication information is used to indicate that the UE needs to perform identity-based cryptography (IBC) and EAP-PSK authentication.
  • the authentication type indication information in the embodiment of the present application is an EAP-PSK flag bit and is used to indicate an authentication request for generating a symmetric key based on the identity signature.
  • the embodiment of the present application includes an EAP-PSK flag bit for indicating convenience and is used for indicating identity based.
  • the authentication request for generating a symmetric key by the cryptographic technique is represented by EAP-PSK-IBS.
  • the access request message sent by the UE to the AUSF may also include the ID of the UE, that is, ID_UE.
  • the AUSF determines whether the UE needs to perform identity-based cryptography and EAP-PSK authentication.
  • the AUSF receives the EAP-PSK-IBS, and can determine that the UE needs to perform identity signing and EAP-PSK authentication.
  • the AUSF can also determine whether the UE needs to perform identity signature and EAP-PSK authentication according to the ID_UE of the UE carried in the attach message.
  • the AUSF After confirming that the UE needs to perform identity verification and EAP-PSK authentication, the AUSF sends a first message of the EAP-PSK authentication protocol to the UE, where the first message includes the random number RAND_S generated by the AUSF, and the identity of the AUSF Wherein the identity of the AUSF consists at least of the AUSF's ID (ID_AUSF) and its PTS (PVT_AUSF) corresponding to the IBS private key SSK.
  • ID_AUSF the identity of the AUSF
  • PVT_AUSF PTS
  • the UE After receiving the first message of the EAP-PSK authentication protocol sent by the AUSF, the UE parses the corresponding parameters, including RAND_S, ID_AUSF, and PVT_AUSF. The UE generates the symmetric key of the UE by using the IBS private key SSK_UE, the elliptic curve generating element G, KPAK, and the received AUSF parameters ID_AUSF, PVT_AUSF, and the symmetric key of the UE can satisfy the following formula:
  • K_UE (SSK_UE)([KPAK+hash(G
  • the K_UE is the UE symmetric key
  • the SSK_UE is the private key of the UE
  • the KPAK is the global public key
  • the ID_AUSF is the identifier of the AUSF
  • the PVT_AUSF is the PVT of the AUSF
  • the G is the elliptic curve generating element
  • the [x]P is represented on the elliptic curve.
  • the UE may further generate the first authentication key required by the EAP-PSK by using the K_UE.
  • AK Authentication Key
  • KDK first Key Derivation Key
  • the UE sends a second message of the EAP-PSK authentication protocol to the AUSF, where the second message includes RAND_S, and the random number RAND_P generated by the UE includes the ID_UE and the PVT_UE in the ID field of the EAP-PSK, and the UE According to the EAP-PSK, the AK is used as the message verification code MAC_P generated by the above message, wherein the MAC_P satisfies the following formula:
  • MAC_P CMAC-AES-128 (AK, ID_P
  • CMAC is a message authentication code
  • AES is an encryption algorithm
  • the AUSF After receiving the second message of the EAP-PSK authentication protocol, the AUSF first parses out RAND_S, RAND_UE, ID_UE, and PVT_UE, and then generates a symmetric key of the AUSF by using its own private key SSK_AUSF and its received parameters ID_UE and PVT_UE of the UE.
  • K_AUSF where K_AUSF satisfies the following formula:
  • K_AUSF (SSK_AUSF)([KPAK+hash(G
  • the K_AUSF is the AUSF symmetric key
  • the SSK_AUSF is the private key of the AUSF
  • the KPAK is the global public key
  • the ID_UE is the identifier of the UE
  • the PVT_UE is the PVT of the UE
  • the G is the elliptic curve generating element
  • the [x]P is represented on the elliptic curve.
  • the AUSF further generates AK and KDK using K_AUSF, and generates a message verification code MAC_P' using the AK and the received information, wherein the MAC_P' satisfies the following formula:
  • MAC_P' CMAC-AES-128(AK,ID_P
  • AUSF can verify MAC_P by MAC_P'.
  • AUSF uses KDK and RAND_P to generate a session key.
  • the AUSF sends a third message of the EAP-PSK authentication protocol to the UE, where the third message includes information specified by the EAP-PSK authentication protocol, such as RAND_S and message authentication code MAC.
  • the UE After receiving the third message of the EAP-PSK authentication protocol sent by the AUSF, the UE sends a fourth message of the EAP-PSK authentication protocol to the AUSF, and the fourth message of the EAP-PSK authentication protocol can be understood as The response message of the UE to the third message of the EAP-PSK authentication protocol sent by the AUSF, which includes information specified by the EAP-PSK authentication protocol such as RAND_S.
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and is used to generate a symmetric key based on the identity signature, and is sent by using the access request information.
  • the UE sends the ID of the UE and the PVT of the UE by using a second message of the EAP-PSK authentication protocol.
  • the AUSF sends the ID of the AUSF and the PVT of the AUSF through the first message of the EAP-PSK authentication protocol.
  • FIG. 8 is a flowchart of an implementation of a second embodiment provided by the present application. Referring to FIG. 8, the method includes:
  • S401, S402, S407, S408, and S409 are the same as S301, S302, S307, S308, and S309 in the first embodiment, and are not described herein again. Only differences will be described below.
  • the AUSF After confirming that the UE needs to perform identity verification and EAP-PSK authentication, the AUSF sends a first message of the EAP-PSK authentication protocol to the UE, where the first message includes the random number RAND_S generated by the AUSF, and the identity of the AUSF , wherein the identity of the AUSF is at least the AUSF ID (ID_AUSF) and the PVT (PVT_AUSF) corresponding to the IBS private key SSK, and the expiration date information of the AUSF corresponding private key (KeyExpireTime_AUSF) composition.
  • ID_AUSF AUSF ID
  • PVT_AUSF PVT_AUSF
  • the UE After receiving the first message of the EAP-PSK authentication protocol sent by the AUSF, the UE parses the corresponding parameters, including RAND_S, ID_AUSF, and PVT_AUSF and KeyExpireTime_AUSF. The UE generates the symmetric key of the UE by using the IBS private key SSK_UE, the elliptic curve generating element G, KPAK, and the received AUSF parameters ID_AUSF, PVT_AUSF, and the symmetric key of the UE can satisfy the following formula:
  • K_UE (SSK_UE)([KPAK+hash(G
  • the K_UE is the UE symmetric key
  • the SSK_UE is the private key of the UE
  • the KPAK is the global public key
  • the ID_AUSF is the identifier of the AUSF
  • the PVT_AUSF is the PVT of the AUSF
  • the G is the elliptic curve generating element
  • the [x]P is represented on the elliptic curve.
  • KDF is a key derivation function, and one implementation is a cryptographic hash.
  • the UE further generates the AK and KDK required by the EAP-PSK using K'.
  • the UE sends a second message of the EAP-PSK authentication protocol to the AUSF, where the second message includes RAND_S, and the random number RAND_P generated by the UE, in the ID field of the EAP-PSK, includes ID_UE and PVT_UE, KeyExpireTime_UE, UE
  • the AK is used as the message verification code MAC_P generated by the above message, wherein the MAC_P satisfies the following formula:
  • MAC_P CMAC-AES-128 (AK, ID_P
  • the AUSF After receiving the second message of the EAP-PSK authentication protocol, the AUSF first parses out RAND_S, RAND_UE, ID_UE, PVT_UE, and KeyExpireTime_UE, and then generates the AUSF by using its own private key SSK_AUSF and its received parameters ID_UE and PVT_UE of the UE.
  • Symmetric key symmetric key K_AUSF where K_AUSF satisfies the following formula:
  • K_AUSF (SSK_AUSF)([KPAK+hash(G
  • the K_AUSF is the AUSF symmetric key
  • the SSK_AUSF is the private key of the AUSF
  • the KPAK is the global public key
  • the ID_UE is the identifier of the UE
  • the PVT_UE is the PVT of the UE
  • the G is the elliptic curve generating element
  • the [x]P is represented on the elliptic curve.
  • KeyExpireTime_UE) using K_AUSF, KeyExpireTime_AUSF, and KeyExpireTime_UE, and further generates AK and KDK using the above K', and generates MAC_P' using the AK and the received information, wherein, MAC_P ' CMAC-AES-128(A, ID_P
  • AUSF uses KDK and RAND_P to generate a session key.
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and is used to generate a symmetric key based on the identity signature, and is sent by using the access request information.
  • the UE is also used to send the private key of the UE.
  • the date information is sent, and the authentication type indication information, the ID of the UE, the PVT of the UE, and the private key expiration date information of the UE are sent by using a second message of the EAP-PSK authentication protocol.
  • the AUSF is further configured to send the private key expiration date information of the AUSF, and send the ID of the AUSF, the PVT of the AUSF, and the private key expiration date information of the AUSF by using a first message of the EAP-PSK authentication protocol.
  • FIG. 9 is a flowchart of an implementation of a third embodiment provided by the present application. Referring to FIG. 9, the method includes:
  • S501, S502, S503, S505, S507, S508, and S509 are the same as S301, S302, S303, S305, S307, S308, and S309 in the first embodiment, and are not described herein again. Instructions are given.
  • the process of receiving and parsing the message in S504 and generating the symmetric key of the UE is the same as the process involved in the first embodiment, except that the derivation of three different keys K' is added in this step.
  • the UE may acquire the secret according to at least one of the random number RAND_P allocated by the key center for the UE and the random number RAND_S allocated by the key center to the AUSF, and the symmetric key K_UE of the UE.
  • K' satisfies the following formula:
  • the UE further generates AK and KDK using the above K'.
  • the process of receiving and parsing the message in S506 and generating the symmetric key of the AUSF is the same as the process involved in the first embodiment, except that the derivation of three different keys K' is added in this step.
  • the AUSF may also acquire a key according to at least one of a random number RAND_P allocated by the key center for the UE and a random number RAND_S allocated by the key center to the AUSF, and the AUSF symmetric key K_AUSF.
  • K' satisfies the following formula:
  • AUSF further produces AK and KDK using K' above.
  • the UE may perform at least one of a random number RAND_P allocated to the UE by the key center and a random number RAND_S allocated by the key center to the AUSF, and a symmetric key K_UE of the UE.
  • the UE and the AUSF further generate AK and KDK with K'.
  • FIG. 10 is a flowchart of an implementation of a fourth embodiment provided by the present application. Referring to FIG. 10, the method includes:
  • S603, S605, S607, S608, and S609 are the same as S303, S305, S307, S308, and S309 in the first embodiment, and are not described herein again. Hereinafter, only differences will be described.
  • the UE sends an access request message (Attach) to the AUSF, where the access request message includes information such as the authentication type indication information, the ID_UE, the PVT_UE, and the UE private key expiration time KeyExpireTime_UE.
  • the AUSF After receiving the access request information sent by the UE, the AUSF parses and acquires the ID_UE, the PVT_UE, the KeyExpireTime_UE, and the like. The AUSF generates a symmetric key symmetric key K_AUSF of the AUSF according to the information provided by the UE.
  • AUSF acquires AK and KDK according to K or K' and EAP-PSK standard RFC 4764.
  • the UE After receiving the first message of the EAP-PSK authentication protocol sent by the AUSF, the UE parses the corresponding parameters, including RAND_S, ID_AUSF, and PVT_AUSF and KeyExpireTime_AUSF. The UE generates the symmetric key K_UE of the UE using the IBS private key SSK_UE, the elliptic curve generating element G, KPAK, and the received AUSF parameters ID_AUSF, PVT_AUSF.
  • the UE may further generate the AK and KDK required by the EAP-PSK using K'.
  • the AUSF determines, according to the ID_UE, PVT_UE, and the like information provided by the UE, that the UE needs to perform identity-based cryptography and EAP-PSK authentication.
  • the UE sends the authentication type indication information, the ID of the UE, the PVT of the UE, and the private key expiration date information of the UE by using the access request information.
  • the AUSF sends the ID of the AUSF, the PVT of the AUSF, and the private key expiration date information of the AUSF through the first message of the EAP-PSK authentication protocol.
  • FIG. 11 is a flowchart of an implementation of a fifth embodiment provided by the present application. Referring to FIG. 11, the method includes:
  • S703, S704, S705, S707, S708, and S709 are the same as S303, S304, S305, S307, S308, and S309 in the first embodiment, and are not described herein again. Hereinafter, only differences will be described.
  • S701 The UE sends an access request message (Attach) to the AUSF, where the access request message includes information such as ID_UE and PVT_UE.
  • the AUSF After receiving the access request information sent by the UE, the AUSF parses and acquires the ID_UE and the PVT_UE, and generates a symmetric key K_AUSF of the AUSF. Further, AUSF acquires AK and KDK according to K_AUSF and EAP-PSK standard RFC4764.
  • the AUSF determines, according to the ID_UE, PVT_UE, and the like information provided by the UE, that the UE needs to perform identity-based cryptography and EAP-PSK authentication.
  • the AUSF determines that the UE needs to perform identity-based cryptography and EAP-PSK authentication by using information such as ID_UE, PVT_UE, and the like sent by the UE.
  • the solution provided by the embodiment of the present application is introduced from the perspective of interaction between the network authentication node and the user equipment.
  • the network authentication node and the user equipment include corresponding hardware structures and/or software modules for performing the respective functions in order to implement the above functions.
  • the embodiments of the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements of the examples and algorithm steps described in the embodiments disclosed in the application. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the technical solutions of the embodiments of the present application.
  • the embodiments of the present application may perform a function unit mapping on a network authentication node and a user equipment according to the foregoing method example.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • the network authentication node and the user equipment may adopt the structure of the communication apparatus shown in FIG. 5.
  • the network authentication node and the user equipment may adopt the structure shown in FIG.
  • the user equipment 1000 includes a transmitting unit 1001, a receiving unit 1002, and an authentication unit 1003.
  • the network authentication node 2000 includes a receiving unit 2001, a transmitting unit 2002, and an authentication unit 2003. among them:
  • the sending unit 1001 is configured to send the authentication type indication information, the ID of the user equipment 1000, and the PVT of the user equipment 1000 to the network authentication node 2000, where the authentication type indication information is used to indicate that the user equipment 1000 needs to be based on Identity cryptography and EAP-PSK certification.
  • the receiving unit 2001 is configured to receive the authentication type indication information sent by the user equipment 1000, the ID information of the user equipment 1000, and the PVT of the user equipment 1000.
  • a sending unit configured to send, according to the authentication type indication information, that the user equipment 1000 needs to perform identity-based signature and EAP-PSK authentication, send the ID of the network authentication node 2000 to the user equipment 1000, and The PVT of the network authentication node 2000.
  • the receiving unit 1002 is configured to receive an ID of the network authentication node 2000 and a PVT of the network authentication node 2000 sent by the network authentication node 2000.
  • the authentication unit 1003 is configured to generate a symmetric key of the user equipment 1000 according to the ID of the network authentication node 2000, the PVT of the network authentication node 2000, and the private key and the global public key based on the identity of the user equipment 1000.
  • the symmetric key of the user equipment 1000 generates a first authentication key and a first key derivation key, and performs EAP-PSK authentication with the network authentication node 2000 using the first authentication key and the first key derivation key. .
  • the authentication unit 2003 is configured to generate a symmetric key of the network authentication node 2000 according to the ID of the user equipment 1000, the PVT of the user equipment 1000, and the private key and the global public key based on the identity of the network authentication node 2000.
  • the symmetric key of the network authentication node 2000 generates a second authentication key and a second key deduction key, and performs EAP-PSK authentication with the user equipment 1000 using the second authentication key and the second key derivation key. .
  • the authentication unit 1003 generates a first authentication key and a first key deduction key according to the symmetric key of the user equipment 1000 in the following manner:
  • the first authentication key and the first key deduction key are generated according to the private key expiration date information of the network authentication node 2000 and the symmetric key of the user equipment 1000 received by the receiving unit 1002. Or the user equipment 1000 generates a first authentication according to at least one of a random number generated by the user equipment 1000 and a received random number generated by the network authentication node 2000, and a symmetric key of the user equipment 1000. The key and the first key derivation key.
  • the authentication unit 2003 generates a second authentication key and a second key deduction key according to the network authentication node symmetric key in the following manner:
  • the authentication type indication information is an authentication request that includes an EAP-PSK flag bit and is used to generate a symmetric key based on the identity signature; or the authentication type indication information is an ID of the user equipment 1000 and the use PVT of the device 1000.
  • the sending unit 1001 is further configured to send private key expiration date information of the user equipment 1000.
  • the sending unit 1001 sends the authentication type indication information, the ID of the user equipment 1000, the PVT of the user equipment 1000, and the private key expiration date information of the user equipment 1000 by using the access request information; or
  • the request information sends the authentication type indication information, and the ID of the user equipment 1000, the PVT of the user equipment 1000, and the private key expiration date information of the user equipment 1000 are sent by the second message of the EAP-PSK authentication protocol.
  • the sending unit 2002 is further configured to send the private key expiration date information of the network authentication node 2000; the sending unit 2002 sends the network authentication node 2000 by using the first message of the EAP-PSK authentication protocol. ID, PVT of the network authentication node 2000, and private key expiration date information of the network authentication node 2000.
  • K_UE (SSK_UE) ([KPAK+hash(G
  • K_AUSF (SSK_AUSF)([KPAK+hash(G
  • x represents an integer
  • P represents a point on the elliptic curve
  • hash() represents a cryptographically meaningful hash function
  • symbol represents a character concatenation.
  • the specific implementations of the user equipments 1000 and the network authentication nodes 2000 may refer to the functions of the user equipment 10 and the network authentication node 20 in the foregoing embodiments, and details are not described herein again.
  • the implementation of the embodiment of the present application can implement the mutual authentication by using the EAP-PSK-based authentication method without changing the EAP-PSK authentication protocol interaction and its format, so as to support the existing work in 3GPP and its support.
  • IBC-based interactive authentication on the EAP authentication framework enables IBC public key technology to match EAP's existing protocols.
  • embodiments of the present application can be provided as a method, system, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
  • These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory include instructions.
  • the instruction means implements the functions specified in a block or blocks of a flow or a flow and/or a block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'authentification de réseau, un équipement utilisateur, un nœud d'authentification de réseau et un système. Le procédé d'authentification de réseau comprend les étapes suivantes : un équipement utilisateur envoie des informations d'indication de type d'authentification ainsi qu'un ID et un PVT de l'équipement utilisateur à un nœud d'authentification de réseau ; le nœud d'authentification de réseau envoie un ID et un PVT du nœud d'authentification de réseau à l'équipement utilisateur ; l'équipement utilisateur génère, en fonction de l'ID et du PVT du nœud d'authentification de réseau, et en fonction d'une clé publique globale et d'une clé privée fondée sur l'identité de l'équipement utilisateur, une clé symétrique d'équipement utilisateur, et génère une première clé d'authentification et une première clé de dérivation de clé en fonction de la clé symétrique de l'équipement utilisateur ; le nœud d'authentification de réseau génère, en fonction de l'ID et du PVT de l'équipement utilisateur, et en fonction d'une clé publique globale et d'une clé privée fondée sur l'identité du nœud d'authentification de réseau, une clé symétrique de nœud d'authentification de réseau et génère une seconde clé d'authentification et une seconde clé de dérivation de clé en fonction de la clé symétrique de nœud d'authentification de réseau ; et le nœud d'authentification de réseau et l'équipement utilisateur effectuent une authentification EAP-PSK. La présente invention permet à une technologie de clé publique IBC de correspondre à un protocole EAP existant.
PCT/CN2017/103241 2017-01-24 2017-09-25 Procédé de vérification de réseau, équipement utilisateur, nœud d'authentification de réseau et système WO2018137352A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710060133.1A CN108347417B (zh) 2017-01-24 2017-01-24 一种网络认证方法、用户设备、网络认证节点及系统
CN201710060133.1 2017-01-24

Publications (1)

Publication Number Publication Date
WO2018137352A1 true WO2018137352A1 (fr) 2018-08-02

Family

ID=62962945

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/103241 WO2018137352A1 (fr) 2017-01-24 2017-09-25 Procédé de vérification de réseau, équipement utilisateur, nœud d'authentification de réseau et système

Country Status (2)

Country Link
CN (1) CN108347417B (fr)
WO (1) WO2018137352A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309917A (zh) * 2018-10-24 2019-02-05 上海逗点科技股份有限公司 基于移动端软件密码模块的eID数字身份认证方法及系统
WO2020147663A1 (fr) * 2019-01-14 2020-07-23 华为技术有限公司 Procédé et dispositif de traitement de jeton
CN112311556A (zh) * 2020-11-05 2021-02-02 北京领主科技有限公司 设备认证的方法、设备控制的方法、节点、设备、区块链
WO2024067121A1 (fr) * 2022-09-30 2024-04-04 中国移动通信有限公司研究院 Procédé de traitement d'authentification, appareil, dispositif et support de stockage lisible

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404666B (zh) 2019-01-02 2024-07-05 中国移动通信有限公司研究院 一种密钥生成方法、终端设备及网络设备
CN111641498B (zh) * 2019-03-01 2022-12-20 中兴通讯股份有限公司 密钥的确定方法及装置
CN114785523B (zh) * 2019-04-28 2024-07-30 华为技术有限公司 网络功能服务的身份校验方法及相关装置
CN112242976B (zh) * 2019-07-17 2022-02-25 华为技术有限公司 一种身份认证方法及装置
CN111669748B (zh) * 2020-05-20 2021-06-29 中国科学院软件研究所 一种隐私保护的移动通信认证方法
EP4149136A4 (fr) * 2020-05-29 2023-06-14 Huawei Technologies Co., Ltd. Procédé d'acquisition de clé et appareil associé
CN120730300A (zh) * 2020-09-30 2025-09-30 华为技术有限公司 一种密钥推衍方法及其装置、系统
CN112333705B (zh) * 2021-01-07 2021-04-02 北京电信易通信息技术股份有限公司 一种用于5g通信网络的身份认证方法及系统
CN113079508B (zh) * 2021-04-06 2022-08-26 中国工商银行股份有限公司 基于区块链网络的数据传输方法、装置及设备
CN114448644B (zh) * 2022-03-04 2024-06-04 芜湖雄狮汽车科技有限公司 基于对称算法的数字证书实现方法、装置、设备及介质
CN115314278B (zh) * 2022-08-04 2023-06-30 长扬科技(北京)股份有限公司 可信网络连接身份认证方法、电子设备及存储介质
CN116260582B (zh) * 2023-05-16 2023-08-15 中汽智联技术有限公司 一种网联车辆的身份认证与加密通信方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119196A (zh) * 2006-08-03 2008-02-06 西安电子科技大学 一种双向认证方法及系统
CN101442522A (zh) * 2008-12-25 2009-05-27 中国电子科技集团公司第五十四研究所 一种基于组合公钥的通信实体标识认证方法
CN101815294A (zh) * 2009-02-20 2010-08-25 华为技术有限公司 P2p网络的接入认证方法、设备和系统

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110673B (zh) * 2006-07-17 2011-02-02 华为技术有限公司 利用一次eap过程执行多次认证的方法和装置
CN101166090A (zh) * 2006-10-20 2008-04-23 中兴通讯股份有限公司 一种基于多重认证以及rsa认证的授权方法
CN102857912A (zh) * 2007-10-05 2013-01-02 交互数字技术公司 由内部密钥中心(ikc)使用的用于安全通信的方法
CN101414907B (zh) * 2008-11-27 2011-10-26 北京邮电大学 一种基于用户身份授权访问网络的方法和系统
CN101552984B (zh) * 2009-05-05 2011-05-18 广州杰赛科技股份有限公司 一种移动通信系统的基站的安全接入方法
CN101895881B (zh) * 2009-05-18 2014-09-17 中国移动通信集团公司 一种实现gba密钥的方法及终端可插拔设备
CN101594616B (zh) * 2009-07-08 2012-05-23 华为终端有限公司 认证方法、服务器、用户设备及通信系统
CN102281287B (zh) * 2011-06-23 2014-05-28 北京交通大学 基于tls的分离机制移动性信令保护系统及保护方法
WO2013185841A1 (fr) * 2012-06-15 2013-12-19 Nokia Siemens Networks Oy Contrôle dynamique de la sélection d'un réseau
CN103795728A (zh) * 2014-02-24 2014-05-14 哈尔滨工程大学 一种隐藏身份且适合资源受限终端的eap认证方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119196A (zh) * 2006-08-03 2008-02-06 西安电子科技大学 一种双向认证方法及系统
CN101442522A (zh) * 2008-12-25 2009-05-27 中国电子科技集团公司第五十四研究所 一种基于组合公钥的通信实体标识认证方法
CN101815294A (zh) * 2009-02-20 2010-08-25 华为技术有限公司 P2p网络的接入认证方法、设备和系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309917A (zh) * 2018-10-24 2019-02-05 上海逗点科技股份有限公司 基于移动端软件密码模块的eID数字身份认证方法及系统
CN109309917B (zh) * 2018-10-24 2021-11-02 上海收付宝科技有限公司 基于移动端软件密码模块的eID数字身份认证方法及系统
WO2020147663A1 (fr) * 2019-01-14 2020-07-23 华为技术有限公司 Procédé et dispositif de traitement de jeton
CN112311556A (zh) * 2020-11-05 2021-02-02 北京领主科技有限公司 设备认证的方法、设备控制的方法、节点、设备、区块链
CN112311556B (zh) * 2020-11-05 2024-05-24 北京领主科技有限公司 设备认证的方法、设备控制的方法、节点、设备、区块链
WO2024067121A1 (fr) * 2022-09-30 2024-04-04 中国移动通信有限公司研究院 Procédé de traitement d'authentification, appareil, dispositif et support de stockage lisible

Also Published As

Publication number Publication date
CN108347417A (zh) 2018-07-31
CN108347417B (zh) 2020-08-07

Similar Documents

Publication Publication Date Title
CN108347417B (zh) 一种网络认证方法、用户设备、网络认证节点及系统
EP3506669B1 (fr) Procédé d'authentification de réseau, et dispositif et système associés
CN107809411B (zh) 移动网络的认证方法、终端设备、服务器和网络认证实体
Raza et al. S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things
Sciancalepore et al. Key management protocol with implicit certificates for IoT systems
US9923721B2 (en) Key agreement and authentication for wireless communication
US10129031B2 (en) End-to-end service layer authentication
CN110612729B (zh) 锚密钥生成方法、设备以及系统
CN110474875B (zh) 基于服务化架构的发现方法及装置
CN109428874B (zh) 基于服务化架构的注册方法及装置
EP3319295A1 (fr) Dispositifs et procédés d'authentification d'un dispositif client
CN109905348B (zh) 端到端认证及密钥协商方法、装置及系统
Park A secure and efficient ECQV implicit certificate issuance protocol for the Internet of Things applications
US20090240944A1 (en) Generation method and update method of authorization key for mobile communication
KR20100103721A (ko) 무선 통신 네트워크에서 노드들의 상호 인증을 위한 방법 및 시스템
WO2018076740A1 (fr) Procédé de transmission de données et dispositif associé
CN102045716B (zh) 一种无线局域网中端站的安全配置方法和系统
EP4247027A1 (fr) Procédé et appareil de communication
Cai et al. A handshake protocol with unbalanced cost for wireless updating
WO2020094475A1 (fr) Accord d'authentification et de chiffrement pour dispositif terminal
EP3413508A1 (fr) Dispositifs et procédés d'authentification d'un dispositif client
Pérez et al. Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures
Singh et al. Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity
Aissaoui et al. Low latency of re-authentication during handover: Re-authentication using a signed token in heterogeneous wireless access networks
US20230308868A1 (en) Method, devices and system for performing key management

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17894580

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17894580

Country of ref document: EP

Kind code of ref document: A1