[go: up one dir, main page]

WO2012155862A1 - 切换方法、基站、用户设备和移动管理实体 - Google Patents

切换方法、基站、用户设备和移动管理实体 Download PDF

Info

Publication number
WO2012155862A1
WO2012155862A1 PCT/CN2012/075765 CN2012075765W WO2012155862A1 WO 2012155862 A1 WO2012155862 A1 WO 2012155862A1 CN 2012075765 W CN2012075765 W CN 2012075765W WO 2012155862 A1 WO2012155862 A1 WO 2012155862A1
Authority
WO
WIPO (PCT)
Prior art keywords
count value
access stratum
stratum count
user equipment
management entity
Prior art date
Application number
PCT/CN2012/075765
Other languages
English (en)
French (fr)
Inventor
陈璟
谢铂云
王涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP12785849.6A priority Critical patent/EP2685751B1/en
Publication of WO2012155862A1 publication Critical patent/WO2012155862A1/zh
Priority to US14/082,480 priority patent/US9398510B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control

Definitions

  • the present application claims to be Chinese patent filed on May 18, 2011, the Chinese Patent Office, application number 201110128967.4, and the invention titled "Handover Method, Base Station, User Equipment and Mobile Management Entity" The priority of the application, the entire content of which passes ⁇ ! Used in conjunction with this application.
  • the present invention relates to the field of wireless communication technologies, and in particular, to a handover method, a base station, a user equipment, and a mobility management entity.
  • GSM Global System of Mobile Communication
  • Universal Mobile Communication System Universal Mobile Communication System
  • UMTS Universal Mobile Communication System
  • LTE Long Term Evolution
  • the handover from UMTS to GSM has been standardized.
  • the existing mechanism has better solved the algorithm and key negotiation problem in the handover process, and user terminals supporting UMTS and GSM access modes have also appeared on the market, and Got a wider range of applications.
  • 3GPP 3rd Generation Partnership Project
  • a handover mechanism between the LTE network and the UMTS network is also established.
  • the switching delays of these existing switching techniques are high.
  • the private interface X2-u is introduced, which can reduce the handover delay.
  • the X2-u interface is an evolved NodeB (hereinafter referred to as eNB) and a radio network controller (Radio Network Controller; The following is the interface between: RNC).
  • eNB evolved NodeB
  • RNC Radio Network Controller
  • the embodiments of the present invention provide a handover method, a base station, a user equipment, and a mobility management entity, to solve the problem of negotiating keys and algorithms between systems, and improve handover security.
  • the embodiment of the invention provides a handover method, including:
  • the handover command carries four least significant bits of the downlink non-access stratum count value and an algorithm used by the user equipment in a universal mobile communication system.
  • the embodiment of the invention further provides a handover method, including:
  • the user equipment receives a handover command sent by the base station, where the handover command carries four least significant bits of the downlink non-access stratum count value and an algorithm used by the user equipment in the universal mobile communication system;
  • the user equipment calculates an encryption key and an integrity key according to the 4 least significant bits of the downlink non-access stratum count value.
  • the embodiment of the invention further provides a handover method, including:
  • the mobility management entity receives the handover request message sent by the base station, where the handover request message carries indication information for instructing the mobility management entity to send the four least significant bits of the downlink non-access stratum count value;
  • the embodiment of the invention further provides a base station, including: An obtaining module, configured to obtain 4 least significant bits of a downlink non-access stratum count value and an algorithm used by the user equipment in the universal mobile communication system;
  • a sending module configured to send a handover command to the user equipment, where the handover command carries four least significant digits of the downlink non-access stratum count value obtained by the obtaining module, and the user equipment is in a universal mobile communication system
  • the embodiment of the invention further provides a user equipment, including:
  • a command receiving module configured to receive a handover command sent by the base station, where the handover command carries four least significant bits of the downlink non-access stratum count value and an algorithm used by the user equipment in the universal mobile communication system;
  • a calculation module configured to calculate an encryption key and an integrity key according to the four least significant bits of the downlink non-access stratum count value received by the command receiving module.
  • the embodiment of the invention further provides a mobility management entity, including:
  • a first message receiving module configured to receive a handover request message sent by the base station, where the handover request message carries indication information for instructing the mobility management entity to send the four least significant bits of the downlink non-access stratum count value;
  • a valid bit sending module configured to send, according to the indication information received by the first message receiving module, four least significant bits of the downlink non-access stratum count value to the base station.
  • the base station may carry the four least significant bits of the downlink non-access stratum count value and the algorithm used by the user equipment in the universal mobile communication system in the handover command sent to the user equipment, so that the user equipment may The obtained 4 least significant bits of the downlink non-access stratum count value are used to calculate an encryption key and an integrity key, and the user equipment can perform inter-system key negotiation with the mobility management entity according to the encryption key and the integrity key. And performing an algorithm negotiation with the mobility management entity according to an algorithm used by the user equipment in the universal mobile communication system, thereby improving the security of the handover.
  • DRAWINGS The drawings used in the embodiments or the description of the prior art are briefly described. It is obvious that the drawings in the following description are some embodiments of the present invention, and are not creative to those skilled in the art. Other drawings can also be obtained from these drawings on the premise of labor.
  • FIG. 1 is a flow chart of an embodiment of a handover method according to the present invention.
  • FIG. 2 is a flow chart of another embodiment of a handover method according to the present invention.
  • FIG. 3 is a flowchart of still another embodiment of a handover method according to the present invention.
  • FIG. 4 is a flow chart of still another embodiment of a handover method according to the present invention.
  • FIG. 5 is a flowchart of still another embodiment of a handover method according to the present invention.
  • FIG. 6 is a flowchart of still another embodiment of a handover method according to the present invention.
  • FIG. 7 is a schematic structural diagram of an embodiment of a base station according to the present invention.
  • FIG. 8 is a schematic structural diagram of another embodiment of a base station according to the present invention.
  • FIG. 9 is a schematic structural diagram of an embodiment of a user equipment according to the present invention.
  • FIG. 10 is a schematic structural diagram of an embodiment of a mobility management entity according to the present invention.
  • FIG. 11 is a schematic structural diagram of another embodiment of a mobility management entity according to the present invention.
  • FIG. 1 is a flowchart of an embodiment of a handover method according to the present invention. As shown in FIG. 1, the handover method may include:
  • Non-Access Stratum Count The algorithm of the four least significant bits of the NAS Count (4 Least Significant Bits; hereinafter referred to as 4LSB) and User Equipment (hereinafter referred to as UE) in UMTS.
  • the downlink NAS Count is obtained.
  • the base station may also receive an S1 Application Protocol (SI Application Protocol; S1AP) message sent by the Mobility Management Entity (MME) when the UE enters the network.
  • SI Application Protocol SI Application Protocol
  • MME Mobility Management Entity
  • the S1AP message carries the security capability of the UE in UMTS.
  • the algorithm for obtaining the UE in the UMTS may be:
  • the base station sends a handover request message to the RNC, where the handover request message carries the security capability of the UE in the UTRAN; then, the base station may receive a handover request acknowledgement message sent by the RNC, the handover
  • the request acknowledgement message carries an algorithm used by the UE in the UMTS selected by the RNC according to the foregoing security capability.
  • the 4LSB that obtains the downlink NAS Count may be:
  • the base station sends a handover request message to the MME, where the handover request message carries indication information for instructing the MME to send the downlink NAS Count of the 4LSB.
  • the base station may receive the MME according to the Indicates the 4LSB of the downlink NAS Count sent by the message.
  • the 4LSB that obtains the downlink NAS Count may also be:
  • the base station monitors and saves the downlink NAS Count, and generates a new NAS Count according to the saved downlink NAS Count; then, the base station can obtain the new NAS Count 4LSB.
  • the base station may further send a handover request message to the MME, where the handover request message carries a new NAS Count, so that the MME calculates an encryption key according to the new NAS Count (Cipher Key). ; hereinafter referred to as: CK ) and Integrity Key (hereinafter referred to as IK ).
  • Cipher Key an encryption key according to the new NAS Count
  • IK Integrity Key
  • the base station may carry the new NAS in the handover command sent to the UE.
  • the UE may determine the NAS Count used by the MME according to the 4LSB of the NAS Count carried by the handover command and the NAS Count saved by the UE. Then, the UE may calculate the CK and the NB according to the NAS Count and the root key used by the MME. IK:.
  • the handover request message sent by the base station to the MME and the handover command sent by the base station to the UE may be sent simultaneously, or may be sent in sequence.
  • the base station sends a handover request message to the MME, and the base station sends a handover command to the UE.
  • the order of transmission is not limited. That is, in this implementation manner, the base station does not need to send the handover command to the UE after receiving the handover request response message sent by the MME, but after obtaining the 4LSB of the downlink NAS Count, the base station may send the handover command to the UE. , which can save switching time.
  • the base station may further send a handover request message to the MME, and then receive a handover request response message sent by the MME, where the handover request response message carries the downlink NAS Count. 4LSB and the algorithm used by the above UE in UMTS.
  • the base station sends the above handover command to the UE. That is to say, in this implementation manner, the base station must send a handover command to the UE after receiving the handover request response message sent by the MME.
  • the base station may carry the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS in the handover command sent to the UE, so that the UE can calculate CK and IK according to the obtained 4LSB of the downlink NAS Count, and then the UE can According to the CK and IK, the MME and the MME perform the negotiation of the inter-system key, and the algorithm is negotiated with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • the handover method may include:
  • the eNB initiates a handover process.
  • the eNB sends a Handover Request message to the RNC, where the handover request message carries the security capability of the UE in the UMTS.
  • the UE when the UE accesses the network through the LTE system, the UE will use the UE in the LTE system.
  • the security capabilities of the UMTS and GSM are sent to the core network node MME. Therefore, in order to enable the eNB to obtain the security capabilities of the UE in UMTS and GSM, the S1AP message between the MME and the eNB may be extended, so that the S1AP message carries the security capabilities of the UE in UMTS and GSM.
  • the MME may send the security capabilities of the UE in the UMTS and the GSM to the eNB in the S1AP message sent to the eNB.
  • the RNC After receiving the handover request message, the RNC performs operations such as quality of service (QoS) mapping, resource allocation, and the like, and sends a handover request confirmation to the eNB.
  • QoS quality of service
  • Handover Request acknowledgement message carries an algorithm used by the UE in UMTS.
  • the RNC may select an algorithm used by the UE in the UMTS according to the security capability of the UE in the UMTS carried in the handover request message, and send the selected algorithm to the eNB in the handover request acknowledgement message.
  • the eNB performs a handover decision.
  • the eNB sends a handover request message to the MME, where the handover request message carries indication information for indicating that the MME sends the 4LSB of the downlink NAS Count.
  • the MME After receiving the foregoing indication information, the MME sends the 4LSB of the downlink NAS Count to the eNB.
  • the eNB After receiving the 4LSB sent by the MME, the eNB sends a handover command (Handover Command) message to the UE, where the handover command message carries the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS.
  • a handover command Handover Command
  • the eNB may send a handover command message to the UE without waiting to receive the handover request response message sent by the MME. This saves switching time.
  • the MME sends a Relocation Request message to the core network (Core Network; hereinafter referred to as CN), and performs a series of reconfiguration operations with the CN.
  • Core Network hereinafter referred to as CN
  • the MME sends a handover request response (Handover Request Response) to the eNB. Message.
  • the UE switches to the RNC.
  • the process of switching from LTE system to UMTS ends.
  • a method for the eNB to obtain the 4LSB of the downlink NAS Count is provided.
  • another method may be used for the eNB to obtain the 4LSB of the downlink NAS Count, which may be specifically:
  • the downlink NAS Count is monitored and saved. Before sending the handover request message to the MME, the eNB generates a new NAS Count according to the downlink NAS Count saved by the eNB, and obtains the 4LSB of the new NAS Count.
  • the eNB may carry the new NAS Count in the handover request message and send it to the MME, and the MME may calculate CK according to the new NAS Count value. And IK; on the other hand, the eNB may send a handover command message to the UE, where the handover command message carries the 4LSB of the generated new NAS Count.
  • the UE may determine the NAS Count used by the MME according to the 4LSB and the downlink NAS Count saved by the UE itself, and then the UE may use the determined NAS Count and the root key ( Kasme ) used by the MME. Together as input, complete the deduction of CK and IK.
  • the handover request message sent by the eNB to the MME and the handover command message sent by the eNB to the UE may be sent simultaneously or in sequence.
  • the eNB sends a handover request message to the MME, and the eNB sends a handover command message to the UE.
  • the order of sending is not limited.
  • the eNB may carry the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS in the handover command message sent to the UE, so that the UE can calculate CK and IK according to the obtained 4LSB of the downlink NAS Count, and then the UE
  • the CK and IK can be used to negotiate the inter-system key according to the MME, and the algorithm is negotiated with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • FIG. 3 is a flowchart of still another embodiment of a handover method according to the present invention. As shown in FIG. 3, the handover method may include:
  • the eNB initiates a handover process. 302.
  • the eNB sends a handover request message to the RNC.
  • the RNC After receiving the handover request message, the RNC performs operations such as QoS mapping, resource allocation, and the like, and sends a handover request acknowledgement message to the eNB.
  • the eNB performs a handover decision.
  • the eNB sends a handover request message to the MME.
  • the MME sends a reconfiguration request message to the CN, and performs a series of reconfiguration operations with the CN.
  • the MME may send a forward reconfiguration request message to the core network node SGSN, where the forward reconfiguration request message carries the security capability of the UE in the UMTS; wherein the SGSN is a serving general packet radio monthly technical support node (Serving) Abbreviation for General Packet Radio Service Support Node).
  • the security capability of the UE in the UMTS is sent to the core network node MME when the UE accesses the network through the LTE system; then the SGSN sends the security capability of the UE in the UMTS to the RNC through the reconfiguration request message, and is determined by the RNC according to the RNC.
  • the security capability of the UE in UMTS selects the algorithm used by the UE in UMTS; after that, the RNC sends the algorithm used by the UE in UMTS to the SGSN in the reconfiguration response message, and finally the UE is in the reconfiguration response message by the SGSN.
  • the algorithm used in UMTS is sent to the MME.
  • the MME sends a handover request response message to the eNB, where the handover request response message carries an algorithm used by the UE in the UMTS and a 4LSB of the downlink NAS Count.
  • the eNB sends a handover command message to the UE, where the handover command message carries the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS.
  • the eNB can send the handover command message to the UE only after receiving the 4LSB of the downlink NAS Count sent by the MME. Therefore, in this embodiment, the eNB sends the handover command message to the UE after receiving the handover request response message sent by the MME. get on.
  • the UE switches to the RNC.
  • the process of switching from LTE system to UMTS ends.
  • the eNB after receiving the handover request response message sent by the MME, the eNB has obtained the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS. At this time, the eNB The handover command message is sent to the UE, and the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS are carried in the handover command message, so that the negotiation of the key and the algorithm between the systems can be smoothly performed, thereby improving the security of the handover. Sex.
  • FIG. 4 is a flowchart of still another embodiment of a handover method according to the present invention. As shown in FIG. 4, the handover method may include:
  • the UE receives a handover command sent by the base station, where the handover command carries a 4LSB of the downlink NAS Count and an algorithm used by the UE in the UMTS.
  • the UE calculates CK and IK: according to the 4LSB of the downlink NAS Count.
  • the UE may determine the NAS Count used by the MME according to the 4LSB of the downlink NAS Count carried by the handover command and the downlink NAS Count saved by the UE. Then, the UE calculates CK and IK: according to the NAS Count and Kasme used by the MME.
  • the UE may obtain the 4LSB of the downlink NAS Count carried by the handover command and the algorithm used by the UE in the UMTS, and the UE may calculate the CK and the IK according to the 4LSB of the downlink NAS Count. Then, the UE can perform the negotiation of the inter-system key according to the CK and the IK, and negotiate the algorithm with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • FIG. 5 is a flowchart of still another embodiment of a handover method according to the present invention. As shown in FIG. 5, the handover method may include:
  • the MME receives a handover request message sent by the base station, where the handover request message carries indication information for instructing the MME to send the 4LSB of the downlink NAS Count.
  • the MME sends the 4LSB of the downlink NAS Count to the base station according to the foregoing indication information.
  • the indication information of the 4LSB for instructing the MME to send the downlink NAS Count is the 4LSB of the new NAS Count
  • the new NAS Count is generated by the base station according to the monitored and saved downlink NAS Count
  • the request message also carries the above new NAS Count
  • the MME can also calculate CK and IK: based on the new NAS Count described above.
  • the MME may also send a handover request response message to the base station, the handover response message carrying the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS.
  • the MME after receiving the handover request message sent by the base station, the MME sends the 4LSB of the downlink NAS Count to the base station according to the indication information carried in the handover request message, so that the base station sends the 4LSB to the UE, so that the UE can perform the base station according to the base station.
  • the transmitted 4LSB calculates CK and IK
  • the MME also calculates CK and IK according to the downlink NAS Count corresponding to the 4LSB sent to the base station, so that the UE and the MME can negotiate the inter-system key according to the calculated CK and IK, thereby Improve the security of the switch.
  • FIG. 6 is a flowchart of still another embodiment of a handover method according to the present invention. As shown in FIG. 6, the handover method may include:
  • the MME receives a handover request message sent by the base station, where the handover request message carries a NAS Count generated by the base station.
  • the MME calculates CK and IK: according to the NAS Count generated by the base station carried by the handover request message.
  • the MME may calculate CK and IK according to the NAS Count generated by the base station, and the MME may perform inter-system key negotiation with the UE according to the CK and the IK, thereby improving handover security.
  • FIG. 7 is a schematic structural diagram of an embodiment of a base station according to the present invention.
  • the base station in this embodiment may implement the process of the embodiment shown in FIG. 1 of the present invention.
  • the base station may include:
  • An obtaining module 71 configured to obtain a 4LSB of the downlink NAS Count and an algorithm used by the UE in the UMTS;
  • the sending module 72 is configured to send a handover command to the UE, where the handover command carries the 4LSB of the downlink NAS Count obtained by the obtaining module 71 and an algorithm used by the UE in the UMTS.
  • the base station, the sending module 72 may carry the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS in the handover command sent to the UE, so that the UE can calculate CK and IK according to the obtained 4LSB of the downlink NAS Count, and then the UE can According to the CK and IK, the MME and the MME perform the negotiation of the inter-system key, and the algorithm is negotiated with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • FIG. 8 is a schematic structural diagram of another embodiment of a base station according to the present invention. Compared with the base station shown in FIG. 7, the difference is that, in an implementation manner of this embodiment, the base station shown in FIG. 8 may further include:
  • the receiving module 73 is configured to receive an S1AP message sent by the MME, where the S1AP message carries the security capability of the UE in the UMTS.
  • the obtaining module 71 may include:
  • the first sending sub-module 711 is configured to send a handover request message to the RNC, where the handover request message carries the security capability of the UE in the UMTS;
  • the first receiving sub-module 712 is configured to receive a handover request acknowledgement message sent by the RNC, where the handover request acknowledgement message carries an algorithm used by the RNC in the UMTS according to the security capability selected by the RNC.
  • the first sending submodule 711 may further send a handover request message to the MME, where the handover request message carries an indication message for instructing the MME to send the downlink NAS Count of the 4LSB.
  • the first receiving submodule 712 may further receive the mobility management entity according to the foregoing. Indicates the 4LSB of the downlink NAS Count sent by the message.
  • the obtaining module 71 may further include:
  • the monitoring submodule 713 is configured to monitor and save the downlink NAS Count
  • the generating submodule 714 is configured to generate the downlink NAS Count saved according to the monitoring submodule 713. Into NAS Count;
  • the valid bit obtaining sub-module 715 is used to obtain the 4LSB of the NAS Count generated by the generating sub-module 714.
  • the sending module 72 may further send a handover request message to the MME, where the handover request message carries a new NAS Count generated by the generating submodule 714, so that the MME calculates the CK and the new NAS Count generated by the generating submodule 714. IK:.
  • the sending module 72 may further carry the 4LSB of the new NAS Count generated by the generating submodule 714 and the algorithm used by the UE in the UMTS in the handover command sent to the UE.
  • the UE may determine the NAS Count used by the MME according to the 4LSB of the NAS Count carried by the handover command and the NAS Count saved by the UE. Then, the UE may use the NAS Count used by the MME. Root key, calculate CK and IK:.
  • the sending module 72 may further send a handover request message to the MME.
  • the obtaining module 71 may receive a handover request response message sent by the MME, where the handover request response message is sent.
  • the obtaining module 71 After receiving the handover request response message sent by the MME, the obtaining module 71 has obtained the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS, at this time, the sending module 72 sends a handover command to the UE, and the handover command is The algorithm used by the 4LSB carrying the downlink NAS Count and the UE in UMTS.
  • the base station, the sending module 72 may carry the 4LSB of the downlink NAS Count and the algorithm used by the UE in the UMTS in the handover command sent to the UE, so that the UE can calculate CK and IK according to the obtained 4LSB of the downlink NAS Count, and then the UE can According to the CK and IK, the MME and the MME perform the negotiation of the inter-system key, and the algorithm is negotiated with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • FIG. 9 is a schematic structural diagram of an embodiment of a user equipment according to the present invention.
  • the UE in this embodiment may implement the process of the embodiment shown in FIG. 4 of the present invention.
  • the UE may include:
  • the command receiving module 91 is configured to receive a handover command sent by the base station, where the handover command carries the 4LSB of the downlink NAS Count and an algorithm used by the UE in the UMTS;
  • the calculating module 92 is configured to calculate CK and IK: according to the 4LSB of the downlink NAS Count received by the command receiving module 91.
  • the calculation module 92 may determine, according to the 4LSB of the downlink non-access stratum count value received by the command receiving module 91 and the NAS Count saved by the UE, the NAS Count used by the MME, and according to the NAS Count and the root key used by the MME. , calculate CK and IK:.
  • the UE can obtain the 4LSB of the downlink NAS Count carried by the handover command and the algorithm used by the UE in the UMTS, and then the calculation module 92 can use the 4LSB of the downlink NAS Count.
  • the CK and the IK are calculated, and then the UE can perform the negotiation of the inter-system key according to the CK and the IK, and negotiate the algorithm with the MME according to the algorithm used by the UE in the UMTS, so that the security of the handover can be improved.
  • FIG. 10 is a schematic structural diagram of an embodiment of a mobility management entity according to the present invention.
  • the MME in this embodiment may implement the process of the embodiment shown in FIG. 5 of the present invention.
  • the MME may include:
  • the first message receiving module 1001 is configured to receive a handover request message sent by the base station, where the handover request message carries indication information for instructing the MME to send the 4LSB of the downlink NAS Count, and the valid bit sending module 1002 is configured to receive the module according to the first message.
  • the indication information received by 1001 sends the 4LSB of the downlink NAS Count to the base station.
  • the MME may further include:
  • the first key calculation module 1003 is configured to: when the first message receiving module 1001 receives the indication information that the MME sends the downlink NAS Count, the 4LSB is the 4LSB of the new NAS Count, and the handover request message further carries the new In the case of NAS Count, CK and IK are calculated based on the above new NAS Count; the above new NAS Count is monitored and saved by the base station according to the base station. Generated by the downstream NAS Count.
  • the valid bit sending module 1002 sends the 4LSB of the downlink NAS Count to the base station according to the indication information carried in the handover request message, so that the base station selects the 4LSB.
  • Sending to the UE so that the UE can calculate CK and IK according to the 4LSB sent by the base station, and the first key calculation module 1003 also calculates CK and IK according to the downlink NAS Count corresponding to the 4LSB sent by the base station, so that the UE and the MME can The negotiation of the inter-system key is performed according to the respective calculated CK and IK, so that the security of the handover can be improved.
  • FIG. 11 is a schematic structural diagram of another embodiment of the mobility management entity according to the present invention.
  • the MME in this embodiment may implement the process of the embodiment shown in FIG. 6 of the present invention.
  • the MME may include:
  • the second message receiving module 1101 is configured to receive a handover request message sent by the base station, where the handover request message carries a NAS Count generated by the base station;
  • the second key calculation module 1102 is configured to calculate CK and IK: according to the NAS Count generated by the base station carried by the handover request message received by the second message receiving module 1101.
  • the second key calculation module 1102 can calculate CK and IK according to the NAS Count generated by the base station, and the MME can perform inter-system key negotiation with the UE according to the CK and the IK, thereby improving the security of the handover.
  • modules in the apparatus in the embodiments may be distributed in the apparatus of the embodiment according to the embodiment, or may be correspondingly changed in one or more apparatuses different from the embodiment.
  • the modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种切换方法、基站、用户设备和移动管理实体,所述切换方法包括:获得下行非接入层计数值的4个最低有效位和用户设备在通用移动通信系统中使用的算法;向所述用户设备发送切换命令,所述切换命令携带所述下行非接入层计数值的4个最低有效位和所述用户设备在通用移动通信系统中使用的算法,以使所述用户设备根据所述下行非接入层计数值的4个最低有效位计算加密密钥和完整性密钥。通过本发明实施例,基站可以在向用户设备发送的切换命令中携带下行非接入层计数值的4个最低有效位和该用户设备在通用移动通信系统中使用的算法,从而可以顺利进行系统间密钥和算法的协商,进而可以提高切换的安全性。

Description

切换方法、 基站、 用户设备和移动管理实体 本申请要求于 2011 年 05 月 18 日提交中国专利局、 申请号为 201110128967.4、 发明名称为"切换方法、 基站、 用户设备和移动管理实体" 的中国专利申请的优先权, 其全部内容通过 ^!用结合在本申请中。 技术领域 本发明涉及无线通讯技术领域, 具体涉及一种切换方法、 基站、 用户 设备和移动管理实体。
背景技术 随着移动通信技术的不断发展和运营商逐步的网络升级, 在实际网络 中可能同 时存在全球移动通信系统 ( Global System of Mobile Communication;以下简称: GSM )网络、通用移动通信系统( Universal Mobile Telecommunication System; 以下简称: UMTS ) 网络以及长期演进( Long Term Evolution; 以下简称: LTE ) 网络。 为了保证用户通信业务的连续性 和质量, 需要保证用户能够在不同网络之间可以进行成功的切换。
目前从 UMTS 到 GSM 的切换已经标准化, 现有机制已经较好的解 决了该切换过程中的算法和密钥协商问题,同时支持 UMTS 和 GSM接入 方式的用户终端也已经在市场上出现, 并得到了较广泛的应用。 在第三代 合作伙伴计划 ( 3rd Generation Partnership Project; 以下简称: 3GPP )标准 中, 也制定了 LTE网络和 UMTS网络之间的切换机制。 但是现有的这些切 换技术的切换时延较高。
在 LTE切换到 UMTS的切换方案中, 引入私有接口 X2-u, 能够减少切 换时延, 其中 X2-u接口为演进基站(evolved NodeB; 以下简称: eNB )与 无线网络控制器( Radio Network Controller; 以下简称: RNC )之间的接口。 但是该切换方案无法解决系统间密钥和算法协商的问题, 导致切换的安全 性较低。
发明内容 本发明实施例提供一种切换方法、 基站、 用户设备和移动管理实体, 以实现解决系统间密钥和算法协商的问题, 提高切换的安全性。
本发明实施例提供一种切换方法, 包括:
获得下行非接入层计数值的 4个最低有效位和用户设备在通用移动通 信系统中使用的算法;
向所述用户设备发送切换命令, 所述切换命令携带所述下行非接入层 计数值的 4个最低有效位和所述用户设备在通用移动通信系统中使用的算 法。
本发明实施例还提供一种切换方法, 包括:
用户设备接收基站发送的切换命令, 所述切换命令携带下行非接入层 计数值的 4个最低有效位和所述用户设备在通用移动通信系统中使用的算 法;
所述用户设备根据所述下行非接入层计数值的 4个最低有效位计算加 密密钥和完整性密钥。
本发明实施例还提供一种切换方法, 包括:
移动管理实体接收基站发送的切换请求消息, 所述切换请求消息携带 用于指示所述移动管理实体发送下行非接入层计数值的 4个最低有效位的 指示信息;
所述移动管理实体根据所述指示信息向所述基站发送所述下行非接入 层计数值的 4个最低有效位。
本发明实施例还提供一种基站, 包括: 获得模块, 用于获得下行非接入层计数值的 4个最低有效位和用户设 备在通用移动通信系统中使用的算法;
发送模块, 用于向所述用户设备发送切换命令, 所述切换命令携带所 述获得模块获得的所述下行非接入层计数值的 4个最低有效位和所述用户 设备在通用移动通信系统中使用的算法。
本发明实施例还提供一种用户设备, 包括:
命令接收模块, 用于接收基站发送的切换命令, 所述切换命令携带下 行非接入层计数值的 4个最低有效位和所述用户设备在通用移动通信系统 中使用的算法;
计算模块, 用于根据所述命令接收模块接收的所述下行非接入层计数 值的 4个最低有效位计算加密密钥和完整性密钥。
本发明实施例还提供一种移动管理实体, 包括:
第一消息接收模块, 用于接收基站发送的切换请求消息, 所述切换请 求消息携带用于指示所述移动管理实体发送下行非接入层计数值的 4个最 低有效位的指示信息;
有效位发送模块, 用于根据所述第一消息接收模块接收的所述指示信 息向所述基站发送所述下行非接入层计数值的 4个最低有效位。
通过本发明实施例, 基站可以在向用户设备发送的切换命令中携带下行非 接入层计数值的 4个最低有效位和该用户设备在通用移动通信系统中使用 的算法, 从而用户设备可以根据获得的下行非接入层计数值的 4个最低有效 位计算加密密钥和完整性密钥, 进而用户设备可以根据该加密密钥和完整 性密钥与移动管理实体进行系统间密钥的协商, 以及根据该用户设备在通 用移动通信系统中使用的算法与移动管理实体进行算法的协商, 从而可以 提高切换的安全性。 附图说明 实施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明切换方法一个实施例的流程图;
图 2为本发明切换方法另一个实施例的流程图;
图 3为本发明切换方法再一个实施例的流程图;
图 4为本发明切换方法又一个实施例的流程图;
图 5为本发明切换方法又一个实施例的流程图;
图 6为本发明切换方法又一个实施例的流程图;
图 7为本发明基站一个实施例的结构示意图;
图 8为本发明基站另一个实施例的结构示意图;
图 9为本发明用户设备一个实施例的结构示意图;
图 10为本发明移动管理实体一个实施例的结构示意图;
图 11为本发明移动管理实体另一个实施例的结构示意图。
具体实施方式 为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本 发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创造性劳动的前 提下所获得的所有其他实施例, 都属于本发明保护的范围。
图 1为本发明切换方法一个实施例的流程图, 如图 1所示, 该切换方 法可以包括:
101 , 获得下行非接入层计数值 ( Non- Access Stratum Count; 以下简称: NAS Count )的 4个最低有效位 ( 4 Least Significant Bits; 以下简称: 4LSB ) 和用户设备 ( User Equipment; 以下简称: UE )在 UMTS中使用的算法。
102, 向上述 UE发送切换命令, 该切换命令携带上述 NAS Count的 4LSB和该 UE在 UMTS中使用的算法。
进一步地, 本实施例的一种实现方式中, 在获得下行 NAS Count 的
4LSB和 UE在 UMTS 中使用的算法之前, 基站还可以接收移动管理实体 ( Mobility Management Entity; 以下简称: MME )在该 UE入网时发送的 S1应用协议 ( SI Application Protocol; 以下简称: S1AP ) 消息, 该 S1AP 消息携带该 UE在 UMTS中的安全能力。
这样, 获得 UE在 UMTS中使用的算法可以为: 基站向 RNC发送切换 请求消息, 该切换请求消息携带上述 UE在 UTRAN中的安全能力; 然后, 基站可以接收 RNC发送的切换请求确认消息, 该切换请求确认消息携带该 RNC根据上述安全能力选择的上述 UE在 UMTS中使用的算法。
本实现方式中, 获得下行 NAS Count的 4LSB可以为: 基站向 MME 发送切换请求消息, 该切换请求消息携带用于指示该 MME发送下行 NAS Count的 4LSB的指示信息; 然后, 基站可以接收 MME根据该指示信息发 送的下行 NAS Count的 4LSB。
本实现方式中, 获得下行 NAS Count的 4LSB也可以为: 基站监控并 保存下行 NAS Count, 根据保存的下行 NAS Count生成新的 NAS Count; 然后, 基站可以获得新的 NAS Count的 4LSB。
进一步地, 根据保存的 NAS Count生成新的 NAS Count之后, 基站还 可以向 MME发送切换请求消息,该切换请求消息携带新的 NAS Count, 以 使 MME根据新的 NAS Count计算加密密钥(Cipher Key; 以下简称: CK ) 和完整性密钥 ( Integrity Key; 以下简称: IK ) 。
本实现方式中,基站可以在向 UE发送的切换命令中携带上述新的 NAS
Count的 4LSB和该 UE在 UMTS中使用的算法, 这样在 UE接收到该切换 命令之后, 该 UE可以根据该切换命令携带的 NAS Count的 4LSB和该 UE 保存的 NAS Count, 确定 MME使用的 NAS Count; 然后, 该 UE可以根据 MME使用的 NAS Count和根密钥 , 计算 CK和 IK:。
本实现方式中,基站向 MME发送的切换请求消息, 以及基站向 UE发 送的切换命令可以同时发送, 也可以先后发送, 本实现方式对基站向 MME 发送切换请求消息, 以及基站向 UE发送切换命令的发送顺序不作限定。也 就是说,本实现方式中,基站不需在接收到 MME发送的切换请求响应消息 之后, 才向 UE发送切换命令, 而是在获得下行 NAS Count的 4LSB之后, 就可以向 UE发送切换命令了, 从而可以节省切换时间。
本实施例的另一种实现方式中,在向 UE发送切换命令之前,基站还可 以先向 MME发送切换请求消息,然后接收 MME发送的切换请求响应消息, 该切换请求响应消息携带下行 NAS Count的 4LSB和上述 UE在 UMTS中 使用的算法。 接下来, 基站再向 UE发送上述切换命令。 也就是说, 在这种 实现方式中,基站必须要在接收到 MME发送的切换请求响应消息之后才能 向 UE发送切换命令。
上述实施例中, 基站可以在向 UE发送的切换命令中携带下行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法, 从而 UE可以根据获得的 下行 NAS Count的 4LSB计算 CK和 IK, 进而 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商, 以及根据该 UE在 UMTS 中使用的算法与 MME进行算法的协商, 从而可以提高切换的安全性。
图 2为本发明切换方法另一个实施例的流程图, 如图 2所示, 该切换 方法可以包括:
201 , eNB发起切换流程。
202, eNB向 RNC发送切换请求(Handover Request )消息, 该切换请 求消息携带 UE在 UMTS中的安全能力。
本实施例中, UE通过 LTE系统接入网络时, UE会将该 UE在 LTE系 统、 UMTS和 GSM的安全能力发送给核心网节点 MME。因此,为了让 eNB 能够获得 UE在 UMTS和 GSM中的安全能力 , 可以对 MME和 eNB之间 的 S1AP消息进行扩展, 使 S1AP消息携带 UE在 UMTS和 GSM中的安全 能力。具体地, UE入网时, MME可以在发送给 eNB的 S1AP消息中将 UE 在 UMTS和 GSM中的安全能力一并发送给 eNB。
203 , RNC收到切换请求消息之后, 进行服务质量(Quality of Service; 以下简称: QoS ) 映射、 资源分配等操作, 并向 eNB 发送切换请求确认
( Handover Request Acknowledgement; 以下简称: Handover Request ACK ) 消息, 该切换请求确认消息携带 UE在 UMTS中使用的算法。
具体地, RNC可以根据切换请求消息中携带的 UE在 UMTS中的安全 能力选择该 UE在 UMTS中使用的算法, 并在切换请求确认消息中将选择 的算法发送给 eNB。
204, eNB进行切换判决。
205 , eNB向 MME发送切换请求消息, 该切换请求消息中携带用于指 示该 MME发送下行 NAS Count的 4LSB的指示信息。
206, MME接收到上述指示信息之后, 向 eNB发送下行 NAS Count 的 4LSB。
207, eNB接收到 MME发送的 4LSB 之后, 向 UE发送切换命令 ( Handover Command )消息,该切换命令消息携带下行 NAS Count的 4LSB 和 UE在 UMTS中使用的算法。
本实施例中, eNB在接收下行 NAS Count的 4LSB之后, 就可以向 UE 发送切换命令消息了, 而不需等待接收到 MME发送的切换请求响应消息。 从而可以节省切换时间。
208 , MME向核心网 ( Core Network; 以下简称: CN )发送重配置请 求( Relocation Request ) 消息, 并与 CN进行一系列的重配置操作。
209, MME向 eNB发送切换请求响应 ( Handover Request Response ) 消息。
210, UE切换到 RNC。 从 LTE系统切换到 UMTS的过程结束。
上述实施例中提供了 eNB获得下行 NAS Count的 4LSB的一种方法, 除上述实施例中提供的方法之外, 还可能存在 eNB获得下行 NAS Count的 4LSB的另外一种方法, 具体可以为: eNB监控并保存下行 NAS Count, 在 向 MME发送切换请求消息之前, eNB根据该 eNB保存的下行 NAS Count 生成一个新的 NAS Count, 并获得该新的 NAS Count的 4LSB。
在 eNB根据该 eNB保存的下行 NAS Count生成一个新的 NAS Count 之后, 一方面, eNB可以将该新的 NAS Count携带在切换请求消息中发送 给 MME , MME可以根据该新的 NAS Count值计算 CK和 IK; 另一方面, eNB 可以向 UE发送切换命令消息, 该切换命令消息中携带生成的新的 NAS Count的 4LSB。 UE接收到该切换命令消息之后, 根据该 4LSB和该 UE自身保存的下行 NAS Count, 可以确定出 MME使用的 NAS Count, 然 后 UE可以将确定出的 MME使用的 NAS Count和根密钥( Kasme )一起作 为输入, 完成 CK和 IK的推演。 其中, eNB发送给 MME的切换请求消息, 以及 eNB发送给 UE的切换命令消息可以同时发送, 也可以先后发送, 本 实施例对 eNB向 MME发送切换请求消息, 以及 eNB向 UE发送切换命令 消息的发送顺序不作限定。
上述实施例中, eNB可以在向 UE发送的切换命令消息中携带下行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法, 从而 UE可以根据获得的 下行 NAS Count的 4LSB计算 CK和 IK, 进而 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商, 以及根据该 UE在 UMTS 中使用的算法与 MME进行算法的协商, 从而可以提高切换的安全性。
图 3为本发明切换方法再一个实施例的流程图, 如图 3所示, 该切换 方法可以包括:
301 , eNB发起切换流程。 302 , eNB向 RNC发送切换请求消息。
303 , RNC接收到该切换请求消息之后, 进行 QoS映射、 资源分配等 操作, 并向 eNB发送切换请求确认消息。
304, eNB进行切换判决。
305, eNB向 MME发送切换请求消息。
306, MME向 CN发送重配置请求消息, 并与 CN进行一系列的重配 置操作。
具体地 , MME可以向核心网节点 SGSN发送前向重配置请求消息 , 该 前向重配置请求消息携带 UE在 UMTS中的安全能力; 其中, SGSN为服 务通用分组无线月良务技术支持节点 (Serving General Packet Radio Service Support Node )的简称。其中,该 UE在 UMTS中的安全能力是 UE通过 LTE 系统接入网络时, 发送给核心网节点 MME的; 然后 SGSN通过重配置请 求消息将 UE在 UMTS中的安全能力发送给 RNC,由 RNC根据 UE在 UMTS 中的安全能力选择该 UE在 UMTS中使用的算法; 之后, RNC会在重配置 响应消息中将 UE在 UMTS中使用的算法发送给 SGSN, 最后由 SGSN通 过重配置响应消息将 UE在 UMTS中使用的算法发送给 MME。
307 , MME向 eNB发送切换请求响应消息, 该切换请求响应消息携带 UE在 UMTS中使用的算法和下行 NAS Count的 4LSB。
308, eNB向 UE发送切换命令消息, 该切换命令消息中携带下行 NAS Count的 4LSB和 UE在 UMTS中使用的算法。
由于 eNB只有在接收到 MME发送的下行 NAS Count的 4LSB之后才 能向 UE发出切换命令消息, 因此, 本实施例中, eNB向 UE发送切换命令 消息必须要在接收到 MME发送的切换请求响应消息之后进行。
309, UE切换到 RNC。 从 LTE系统切换到 UMTS的过程结束。
上述实施例中, 接收到 MME发送的切换请求响应消息之后, eNB 已 获得下行 NAS Count的 4LSB和 UE在 UMTS中使用的算法, 这时, eNB 才会向 UE发送切换命令消息,并在该切换命令消息中携带下行 NAS Count 的 4LSB和 UE在 UMTS中使用的算法, 从而可以顺利进行系统间密钥和 算法的协商, 进而可以提高切换的安全性。
图 4为本发明切换方法又一个实施例的流程图, 如图 4所示, 该切换 方法可以包括:
401 , UE接收基站发送的切换命令, 该切换命令携带下行 NAS Count 的 4LSB和 UE在 UMTS中使用的算法。
402, UE根据下行 NAS Count的 4LSB计算 CK和 IK:。
具体地, UE可以根据切换命令携带的下行 NAS Count的 4LSB和该 UE保存的下行 NAS Count, 确定 MME使用的 NAS Count; 然后, UE根 据 MME使用的 NAS Count和 Kasme, 计算 CK和 IK:。
上述实施例中, 接收到基站发送的切换命令之后, UE可以获得该切换 命令携带的下行 NAS Count的 4LSB和 UE在 UMTS中使用的算法, 进而 UE可以根据下行 NAS Count的 4LSB计算 CK和 IK,然后 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商 , 以及根据该 UE在 UMTS中使 用的算法与 MME进行算法的协商, 从而可以提高切换的安全性。
图 5为本发明切换方法又一个实施例的流程图, 如图 5所示, 该切换 方法可以包括:
501 , MME接收基站发送的切换请求消息, 该切换请求消息携带用于 指示该 MME发送下行 NAS Count的 4LSB的指示信息。
502, MME根据上述指示信息向基站发送下行 NAS Count的 4LSB。 本实施例 501中, 用于指示 MME发送下行 NAS Count的 4LSB的指 示信息为新的 NAS Count的 4LSB, 该新的 NAS Count为基站根据监控并 保存的下行 NAS Count生成的; 如果 501中的切换请求消息还携带上述新 的 NAS Count, 则 MME还可以根据上述新的 NAS Count计算 CK和 IK:。
进一步地, 本实施例中, MME接收基站发送的切换请求消息之后, MME还可以向基站发送切换请求响应消息,该切换响应消息携带下行 NAS Count的 4LSB和 UE在 UMTS中使用的算法。
上述实施例中, 接收到基站发送的切换请求消息之后, MME根据该切 换请求消息中携带的指示信息向基站发送下行 NAS Count的 4LSB,以便基 站将该 4LSB发送给 UE, 这样 UE即可根据基站发送的 4LSB计算 CK和 IK, 而 MME也会根据发送给基站的 4LSB对应的下行 NAS Count计算 CK 和 IK, 从而 UE与 MME可以根据各自计算的 CK和 IK进行系统间密钥的 协商, 从而可以提高切换的安全性。
图 6为本发明切换方法又一个实施例的流程图, 如图 6所示, 该切换 方法可以包括:
601 , MME接收基站发送的切换请求消息, 该切换请求消息携带基站 生成的 NAS Count。
602, MME根据该切换请求消息携带的基站生成的 NAS Count计算 CK 和 IK:。
上述实施例中 , MME可以根据基站生成的 NAS Count计算 CK和 IK, 进而 MME可以根据该 CK和 IK与 UE进行系统间密钥的协商 , 从而可以 提高切换的安全性。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计算机 可读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序 代码的介质。
图 7为本发明基站一个实施例的结构示意图, 本实施例中的基站可以 实现本发明图 1所示实施例的流程, 如图 7所示, 该基站可以包括:
获得模块 71 , 用于获得下行 NAS Count的 4LSB和 UE在 UMTS中使 用的算法; 发送模块 72, 用于向 UE发送切换命令, 该切换命令携带获得模块 71 获得的下行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法。
上述基站,发送模块 72可以在向 UE发送的切换命令中携带下行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法, 从而 UE可以根据获得的 下行 NAS Count的 4LSB计算 CK和 IK, 进而 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商, 以及根据该 UE在 UMTS 中使用的算法与 MME进行算法的协商, 从而可以提高切换的安全性。
图 8为本发明基站另一个实施例的结构示意图, 与图 7所示的基站相 比, 不同之处在于, 本实施例的一种实现方式中, 图 8所示的基站还可以 包括:
接收模块 73 , 用于接收 MME发送的 S1AP消息, 该 S1AP消息携带 UE在 UMTS中的安全能力。
具体地, 获得模块 71可以包括:
第一发送子模块 711 , 用于向 RNC发送切换请求消息, 该切换请求消 息携带 UE在 UMTS中的安全能力;
第一接收子模块 712, 用于接收 RNC发送的切换请求确认消息, 该切 换请求确认消息携带 RNC根据上述安全能力选择的该 UE在 UMTS中使用 的算法。
进一步地,第一发送子模块 711还可以向 MME发送切换请求消息,该 切换请求消息携带用于指示 MME发送下行 NAS Count的 4LSB的指示信 第一接收子模块 712还可以接收移动管理实体根据上述指示信息发送 的下行 NAS Count的 4LSB。
本实现方式中, 获得模块 71还可以包括:
监控子模块 713 , 用于监控并保存下行 NAS Count;
生成子模块 714, 用于根据监控子模块 713保存的下行 NAS Count生 成 NAS Count;
有效位获得子模块 715 , 用于获得生成子模块 714生成的 NAS Count 的 4LSB。
本实现方式中, 发送模块 72还可以向 MME发送切换请求消息, 该切 换请求消息携带生成子模块 714生成的新的 NAS Count,以使 MME根据生 成子模块 714生成的新的 NAS Count计算 CK和 IK:。 本实现方式中, 发送 模块 72还可以在向 UE发送的切换命令中携带上述生成子模块 714生成的 新的 NAS Count的 4LSB和该 UE在 UMTS中使用的算法。
这样在 UE接收到该切换命令之后,该 UE可以根据该切换命令携带的 NAS Count的 4LSB和该 UE保存的 NAS Count, 确定 MME使用的 NAS Count; 然后, 该 UE可以根据 MME使用的 NAS Count和根密钥,计算 CK 和 IK:。
本实施例的另一种实现方式中, 在发送模块 72发送切换命令之前, 发 送模块 72还可以向 MME发送切换请求消息; 获得模块 71可以接收 MME 发送的切换请求响应消息, 该切换请求响应消息携带下行 NAS Count 的 4LSB和 UE在 UMTS中使用的算法。在接收到 MME发送的切换请求响应 消息之后,获得模块 71已获得下行 NAS Count的 4LSB和 UE在 UMTS中 使用的算法, 这时, 发送模块 72才会向 UE发送切换命令, 并在该切换命 令中携带下行 NAS Count的 4LSB和 UE在 UMTS中使用的算法。
上述基站,发送模块 72可以在向 UE发送的切换命令中携带下行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法, 从而 UE可以根据获得的 下行 NAS Count的 4LSB计算 CK和 IK, 进而 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商, 以及根据该 UE在 UMTS 中使用的算法与 MME进行算法的协商, 从而可以提高切换的安全性。
图 9 为本发明用户设备一个实施例的结构示意图, 本实施例中的 UE 可以实现本发明图 4所示实施例的流程。 如图 9所示 , 该 UE可以包括:
命令接收模块 91 , 用于接收基站发送的切换命令, 该切换命令携带下 行 NAS Count的 4LSB和该 UE在 UMTS中使用的算法;
计算模块 92,用于根据命令接收模块 91接收的下行 NAS Count的 4LSB 计算 CK和 IK:。
具体地, 计算模块 92可以根据命令接收模块 91接收的下行非接入层 计数值的 4LSB和该 UE保存的 NAS Count,确定 MME使用的 NAS Count, 并根据该 MME使用的 NAS Count和根密钥, 计算 CK和 IK:。
上述用户设备,命令接收模块 91接收到基站发送的切换命令之后, UE 可以获得该切换命令携带的下行 NAS Count的 4LSB和 UE在 UMTS中使 用的算法, 进而计算模块 92可以根据下行 NAS Count的 4LSB计算 CK和 IK, 然后 UE可以根据该 CK和 IK与 MME进行系统间密钥的协商 , 以及 根据该 UE在 UMTS中使用的算法与 MME进行算法的协商, 从而可以提 高切换的安全性。
图 10为本发明移动管理实体一个实施例的结构示意图, 本实施例中的 MME可以实现本发明图 5所示实施例的流程。
如图 10所示, 该 MME可以包括:
第一消息接收模块 1001 , 用于接收基站发送的切换请求消息, 该切换 请求消息携带用于指示 MME发送下行 NAS Count的 4LSB的指示信息; 有效位发送模块 1002,用于根据第一消息接收模块 1001接收的指示信 息向基站发送所述下行 NAS Count的 4LSB。
进一步地, 该 MME还可以包括:
第一密钥计算模块 1003 ,用于当第一消息接收模块 1001接收的用于指 示 MME发送下行 NAS Count的 4LSB的指示信息为新的 NAS Count的 4LSB, 且该切换请求消息还携带上述新的 NAS Count 时, 根据上述新的 NAS Count计算 CK和 IK; 上述新的 NAS Count为基站根据监控并保存的 下行 NAS Count生成的。
上述实施例中, 第一消息接收模块 1001接收到基站发送的切换请求消 息之后, 有效位发送模块 1002根据该切换请求消息中携带的指示信息向基 站发送下行 NAS Count的 4LSB, 以便基站将该 4LSB发送给 UE, 这样 UE 即可根据基站发送的 4LSB计算 CK和 IK, 而第一密钥计算模块 1003也会 根据需要向基站发送的 4LSB对应的下行 NAS Count计算 CK和 IK, 从而 UE与 MME可以根据各自计算的 CK和 IK进行系统间密钥的协商, 从而 可以提高切换的安全性。
图 11为本发明移动管理实体另一个实施例的结构示意图, 本实施例中 的 MME可以实现本发明图 6所示实施例的流程。
如图 11所示, 该 MME可以包括:
第二消息接收模块 1101 , 用于接收基站发送的切换请求消息, 该切换 请求消息携带基站生成的 NAS Count;
第二密钥计算模块 1102,用于根据第二消息接收模块 1101接收的切换 请求消息携带的上述基站生成的 NAS Count计算 CK和 IK:。
上述实施例中, 第二密钥计算模块 1102 可以根据基站生成的 NAS Count计算 CK和 IK, 进而 MME可以根据该 CK和 IK与 UE进行系统间 密钥的协商, 从而可以提高切换的安全性。
本领域技术人员可以理解附图只是一个优选实施例的示意图, 附图中 的模块或流程并不一定是实施本发明所必须的。
本领域技术人员可以理解实施例中的装置中的模块可以按照实施例描 述进行分布于实施例的装置中, 也可以进行相应变化位于不同于本实施例 的一个或多个装置中。 上述实施例的模块可以合并为一个模块, 也可以进 一步拆分成多个子模块。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通 技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修 改, 或者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不 使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权利要求
1、 一种切换方法, 其特征在于, 包括:
获得下行非接入层计数值的 4个最低有效位和用户设备在通用移动通 信系统中使用的算法;
向所述用户设备发送切换命令, 所述切换命令携带所述下行非接入层 计数值的 4个最低有效位和所述用户设备在通用移动通信系统中使用的算 法, 以使所述用户设备根据所述下行非接入层计数值的 4个最低有效位计 算加密密钥和完整性密钥。
2、 根据权利要求 1所述的方法, 其特征在于, 所述获得下行非接入层 计数值的 4个最低有效位和用户设备在通用移动通信系统中使用的算法之 前, 还包括:
接收移动管理实体在所述用户设备入网时发送的 S1应用协议消息, 所 述 S 1应用协议消息携带所述用户设备在通用移动通信系统中的安全能力。
3、 根据权利要求 2所述的方法, 其特征在于, 所述获得用户设备在通 用移动通信系统中使用的算法包括:
向无线网络控制器发送切换请求消息, 所述切换请求消息携带所述用 户设备在通用移动通信系统中的安全能力;
接收所述无线网络控制器发送的切换请求确认消息, 所述切换请求确 认消息携带所述无线网络控制器根据所述安全能力选择的所述用户设备在 所述通用移动通信系统中使用的算法。
4、 根据权利要求 1-3任意一项所述的方法, 其特征在于, 所述获得下 行非接入层计数值的 4个最低有效位包括:
向移动管理实体发送切换请求消息, 所述切换请求消息携带用于指示 所述移动管理实体发送所述下行非接入层计数值的 4个最低有效位的指示 信息; 接收所述移动管理实体根据所述指示信息发送的所述下行非接入层计 数值的 4个最低有效位。
5、 根据权利要求 1-3任意一项所述的方法, 其特征在于, 所述获得下 行非接入层计数值的 4个最低有效位包括:
监控并保存下行非接入层计数值, 根据保存的下行非接入层计数值生 成新的非接入层计数值;
获得所述新的非接入层计数值的 4个最低有效位。
6、 根据权利要求 5所述的方法, 其特征在于, 所述根据保存的下行非 接入层计数值生成新的非接入层计数值之后, 还包括:
向移动管理实体发送切换请求消息, 所述切换请求消息携带所述新的 非接入层计数值, 以使所述移动管理实体根据所述新的非接入层计数值计 算加密密钥和完整性密钥。
7、 根据权利要求 1所述的方法, 其特征在于, 所述向所述用户设备发 送切换命令之前, 还包括:
向移动管理实体发送切换请求消息;
接收所述移动管理实体发送的切换请求响应消息, 所述切换请求响应 消息携带所述下行非接入层计数值的 4个最低有效位和所述用户设备在通 用移动通信系统中使用的算法。
8、 一种切换方法, 其特征在于, 包括:
用户设备接收基站发送的切换命令, 所述切换命令携带下行非接入层 计数值的 4个最低有效位和所述用户设备在通用移动通信系统中使用的算 法;
所述用户设备根据所述下行非接入层计数值的 4个最低有效位计算加 密密钥和完整性密钥。
9、 根据权利要求 8所述的方法, 其特征在于, 所述用户设备根据所述 下行非接入层计数值的 4个最低有效位计算加密密钥和完整性密钥包括: 所述用户设备根据所述切换命令携带的所述下行非接入层计数值的 4 个最低有效位和所述用户设备保存的下行非接入层计数值, 确定移动管理 实体使用的非接入层计数值;
所述用户设备根据所述移动管理实体使用的非接入层计数值和根密 钥, 计算加密密钥和完整性密钥。
10、 一种切换方法, 其特征在于, 包括:
移动管理实体接收基站发送的切换请求消息, 所述切换请求消息携带 用于指示所述移动管理实体发送下行非接入层计数值的 4个最低有效位的 指示信息;
所述移动管理实体根据所述指示信息向所述基站发送所述下行非接入 层计数值的 4个最低有效位。
11、 根据权利要求 10所述的方法, 其特征在于,
所述用于指示所述移动管理实体发送下行非接入层计数值的 4个最低 有效位的指示信息为新的非接入层计数值的 4个最低有效位, 所述新的非 接入层计数值为所述基站根据监控并保存的下行非接入层计数值生成的; 如果所述切换请求消息还携带所述新的非接入层计数值, 所述方法还 包括:
所述移动管理实体根据所述新的非接入层计数值计算加密密钥和完整 性密钥。
12、 根据权利要求 10或 11所述的方法, 其特征在于, 所述移动管理 实体接收基站发送的切换请求消息之后, 还包括:
所述移动管理实体向所述基站发送切换请求响应消息, 所述切换响应 消息携带所述下行非接入层计数值的 4个最低有效位和所述用户设备在通 用移动通信系统中使用的算法。
13、 一种基站, 其特征在于, 包括:
获得模块, 用于获得下行非接入层计数值的 4个最低有效位和用户设 备在通用移动通信系统中使用的算法;
发送模块, 用于向所述用户设备发送切换命令, 所述切换命令携带所 述获得模块获得的所述下行非接入层计数值的 4个最低有效位和所述用户 设备在通用移动通信系统中使用的算法。
14、 根据权利要求 13所述的基站, 其特征在于, 还包括:
接收模块, 用于接收移动管理实体发送的 S1应用协议消息, 所述 S1 应用协议消息携带所述用户设备在通用移动通信系统中的安全能力。
15、 根据权利要求 14所述的基站, 其特征在于, 所述获得模块包括: 第一发送子模块, 用于向无线网络控制器发送切换请求消息, 所述切 换请求消息携带所述用户设备在通用移动通信系统中的安全能力;
第一接收子模块, 用于接收所述无线网络控制器发送的切换请求确认 消息, 所述切换请求确认消息携带所述无线网络控制器根据所述安全能力 选择的所述用户设备在所述通用移动通信系统中使用的算法。
16、 根据权利要求 15所述的基站, 其特征在于,
所述第一发送子模块, 还用于向移动管理实体发送切换请求消息, 所 述切换请求消息携带用于指示所述移动管理实体发送所述下行非接入层计 数值的 4个最低有效位的指示信息;
所述第一接收子模块, 还用于接收所述移动管理实体根据所述指示信 息发送的所述下行非接入层计数值的 4个最低有效位。
17、根据权利要求 13-16任意一项所述的基站, 其特征在于, 所述获得 模块还包括:
监控子模块, 用于监控并保存下行非接入层计数值;
生成子模块, 用于根据所述监控子模块保存的下行非接入层计数值生 成新的非接入层计数值;
有效位获得子模块, 用于获得所述生成子模块生成的所述新的非接入 层计数值的 4个最低有效位。
18、 根据权利要求 17所述的基站, 其特征在于,
所述发送模块还用于向移动管理实体发送切换请求消息, 所述切换请 求消息携带所述生成子模块生成的所述新的非接入层计数值, 以使所述移 动管理实体根据所述生成子模块生成的所述新的非接入层计数值计算加密 密钥和完整性密钥。
19、 根据权利要求 13所述的基站, 其特征在于,
所述发送模块, 还用于在发送所述切换命令之前, 向移动管理实体发 送切换请求消息;
所述获得模块, 还用于在所述发送模块发送所述切换命令之前, 接收 所述移动管理实体发送的切换请求响应消息, 所述切换请求响应消息携带 所述下行非接入层计数值的 4个最低有效位和所述用户设备在通用移动通 信系统中使用的算法。
20、 一种用户设备, 其特征在于, 包括:
命令接收模块, 用于接收基站发送的切换命令, 所述切换命令携带下 行非接入层计数值的 4个最低有效位和所述用户设备在通用移动通信系统 中使用的算法;
计算模块, 用于根据所述命令接收模块接收的所述下行非接入层计数 值的 4个最低有效位计算加密密钥和完整性密钥。
21、 根据权利要求 20所述的用户设备, 其特征在于,
所述计算模块, 具体用于根据所述命令接收模块接收的所述下行非接 入层计数值的 4个最低有效位和所述用户设备保存的下行非接入层计数值, 确定移动管理实体使用的非接入层计数值, 并根据所述移动管理实体使用 的非接入层计数值和根密钥, 计算加密密钥和完整性密钥。
22、 一种移动管理实体, 其特征在于, 包括:
第一消息接收模块, 用于接收基站发送的切换请求消息, 所述切换请 求消息携带用于指示所述移动管理实体发送下行非接入层计数值的 4个最 低有效位的指示信息;
有效位发送模块, 用于根据所述第一消息接收模块接收的所述指示信 息向所述基站发送所述下行非接入层计数值的 4个最低有效位。
23、 根据权利要求 22所述的移动管理实体, 其特征在于, 还包括: 第一密钥计算模块, 用于当所述第一消息接收模块接收的所述用于指 示所述移动管理实体发送下行非接入层计数值的 4个最低有效位的指示信 息为新的非接入层计数值的 4个最低有效位, 且所述切换请求消息还携带 所述新的非接入层计数值时, 根据所述新的非接入层计数值计算加密密钥 和完整性密钥; 所述新的非接入层计数值为所述基站根据监控并保存的下 行非接入层计数值生成的。
PCT/CN2012/075765 2011-05-18 2012-05-18 切换方法、基站、用户设备和移动管理实体 WO2012155862A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP12785849.6A EP2685751B1 (en) 2011-05-18 2012-05-18 Handover method, base station, user equipment and mobility management entity
US14/082,480 US9398510B2 (en) 2011-05-18 2013-11-18 Handover method, base station, user equipment, and mobility management entity

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110128967.4 2011-05-18
CN201110128967.4A CN102790965B (zh) 2011-05-18 2011-05-18 切换方法、基站、用户设备和移动管理实体

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/082,480 Continuation US9398510B2 (en) 2011-05-18 2013-11-18 Handover method, base station, user equipment, and mobility management entity

Publications (1)

Publication Number Publication Date
WO2012155862A1 true WO2012155862A1 (zh) 2012-11-22

Family

ID=47156245

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/075765 WO2012155862A1 (zh) 2011-05-18 2012-05-18 切换方法、基站、用户设备和移动管理实体

Country Status (4)

Country Link
US (1) US9398510B2 (zh)
EP (1) EP2685751B1 (zh)
CN (1) CN102790965B (zh)
WO (1) WO2012155862A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519487A (zh) * 2013-09-30 2015-04-15 中兴通讯股份有限公司 一种pdcp计数值的处理方法和装置
US10080168B2 (en) * 2013-12-17 2018-09-18 Nokia Solutions And Networks Gmbh & Co. Kg Handover in software defined networking
CN108293183B (zh) * 2015-11-18 2021-06-01 上海诺基亚贝尔股份有限公司 E-utran与wlan之间的切换
US10257078B2 (en) 2016-04-01 2019-04-09 Qualcomm Incorporated Interworking with legacy radio access technologies for connectivity to next generation core network
CN109699028B (zh) * 2017-10-23 2020-08-25 华为技术有限公司 一种生成密钥的方法、装置及系统
CN111835691B (zh) * 2019-04-22 2022-09-27 中国移动通信有限公司研究院 一种认证信息处理方法、终端和网络设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937487A (zh) * 2005-09-22 2007-03-28 北京三星通信技术研究有限公司 Lte中鉴权和加密的方法
WO2009150493A1 (en) * 2008-06-13 2009-12-17 Nokia Corporation Methods, apparatuses, and computer program products for providing fresh security context during intersystem mobility
WO2011018931A2 (en) * 2009-08-10 2011-02-17 Nec Corporation Method of providing telecommunications network security

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7246236B2 (en) * 2002-04-18 2007-07-17 Nokia Corporation Method and apparatus for providing peer authentication for a transport layer session
WO2007108660A1 (en) * 2006-03-22 2007-09-27 Lg Electronics Inc. Asymmetric cryptography for wireless systems
CN101304311A (zh) * 2008-06-12 2008-11-12 中兴通讯股份有限公司 密钥生成方法和系统
US9276909B2 (en) * 2008-08-27 2016-03-01 Qualcomm Incorporated Integrity protection and/or ciphering for UE registration with a wireless network
CN101931951B (zh) * 2009-06-26 2012-11-07 华为技术有限公司 密钥推演方法、设备及系统
KR101565619B1 (ko) * 2009-07-22 2015-11-03 삼성전자주식회사 무선 통신 시스템에서 이동 단말의 세션 전환 방법 및 장치
US8730912B2 (en) * 2010-12-01 2014-05-20 Qualcomm Incorporated Determining a non-access stratum message count in handover
US20120159151A1 (en) * 2010-12-21 2012-06-21 Tektronix, Inc. Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1937487A (zh) * 2005-09-22 2007-03-28 北京三星通信技术研究有限公司 Lte中鉴权和加密的方法
WO2009150493A1 (en) * 2008-06-13 2009-12-17 Nokia Corporation Methods, apparatuses, and computer program products for providing fresh security context during intersystem mobility
WO2011018931A2 (en) * 2009-08-10 2011-02-17 Nec Corporation Method of providing telecommunications network security

Also Published As

Publication number Publication date
EP2685751A1 (en) 2014-01-15
EP2685751A4 (en) 2014-02-26
EP2685751B1 (en) 2017-09-06
US20140080449A1 (en) 2014-03-20
CN102790965A (zh) 2012-11-21
US9398510B2 (en) 2016-07-19
CN102790965B (zh) 2016-09-14

Similar Documents

Publication Publication Date Title
CN108966220B (zh) 一种密钥推演的方法及网络设备
JP5010690B2 (ja) セキュリティ機能ネゴシエーション方法、システム、および装置
CN101754191B (zh) 处理交递保密设定的方法及其相关通讯装置
EP3582531B1 (en) Network access authentication method based on non-3gpp network, and related device and system
CN101983518B (zh) 用于为切换提供多跳密码分离的方法、设备和计算机程序产品
US20170359719A1 (en) Key generation method, device, and system
WO2012100749A1 (zh) 密钥生成方法和设备
WO2009043294A1 (fr) Procédé et dispositif pour mettre à jour la clé dans l'état actif
WO2011032497A1 (zh) 一种聚合小区的重配置方法、设备和系统
WO2013131319A1 (zh) 切换方法及装置、数据处理方法及装置
WO2012155862A1 (zh) 切换方法、基站、用户设备和移动管理实体
WO2020177501A1 (zh) 密钥配置的方法、装置和终端
WO2009152656A1 (zh) 用户设备转移时密钥身份标识符的生成方法和生成系统
WO2013174267A1 (zh) 无线局域网络的安全建立方法及系统、设备
CN113841443B (zh) 数据传输方法及装置
WO2011020445A1 (zh) 安全信息的交互方法和装置
EP2648437B1 (en) Method, apparatus and system for key generation
WO2012171281A1 (zh) 一种安全参数修改方法及基站
KR20150103063A (ko) Scell 및 ue 사이의 암호화 정보 동기 방법
EP3481101A1 (en) Communication method, user equipment, base station, control plane network element, and communication system
KR20150100710A (ko) 키를 설정하고 전송하는 방법
EP3046362B1 (en) Distribution method, base station and user equipment
CN110972135A (zh) 一种安全通信方法、加密信息确定方法及装置
CN112789896B (zh) 切换传输路径的方法及装置
US20250126476A1 (en) Security decision negotiation method and network element

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12785849

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2012785849

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012785849

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE