WO2017117721A1 - 移动通信方法、装置及设备 - Google Patents
移动通信方法、装置及设备 Download PDFInfo
- Publication number
- WO2017117721A1 WO2017117721A1 PCT/CN2016/070182 CN2016070182W WO2017117721A1 WO 2017117721 A1 WO2017117721 A1 WO 2017117721A1 CN 2016070182 W CN2016070182 W CN 2016070182W WO 2017117721 A1 WO2017117721 A1 WO 2017117721A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mme
- nas
- message
- security mode
- capability
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/125—Protection against power exhaustion attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- the present invention relates to mobile communication technologies, and in particular, to a mobile communication method, apparatus and device.
- the user equipment transmits an attach request (Attach Request) message to the MME (Mobility Manage UE Entity) through an eNB (Evolved Node B).
- the attach request message carries UE Capability information such as network capability and security capability, and the MME provides a service to the UE according to the capability of the received UE.
- the attach request message has no integrity protection, for example, the attach request message in the scenario where the UE first registers the network has no integrity protection.
- the attacker implements a man-in-the-middle attack and modifies the UE capability information sent by the UE to the MME, then The MME will provide services to the UE according to the modified UE capability information, which may result in the UE being unable to use certain services. For example, the attacker sets the voice domain priority and user usage in the UE capability information (Voice domain preference). And UE's usage setting), remove the Additional update type (SMS only) parameter, then the UE can only use the short message service, but can not use the voice call service.
- VoIP domain preference Voice domain preference
- UE's usage setting remove the Additional update type (SMS only) parameter
- the embodiment of the invention provides a mobile communication method, device and device to ensure that the MME obtains correct UE capability information.
- an embodiment of the present invention provides a mobile communication method, including:
- the user equipment UE receives the non-access stratum NAS security mode command message from the mobility management entity MME, where the NAS security mode command message carries the first verification matching information for verifying the UE capability information that the MME has received. ;
- the UE sends a NAS security mode complete message to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received before sending the NAS security mode command message to the UE, where the NAS security mode command message is further And including a hash algorithm used by the MME to perform hash calculation on the attached request message, an integrity algorithm used by the MME, a secret key identifier, and a first non-the NAS security mode command message.
- Access layer message authentication code NAS-MAC Access layer message authentication code
- the UE calculates a second NAS-MAC of the NAS security mode command message received by the UE;
- the UE calculates a second hash value of the attach request message sent by the UE to the MME according to the hash algorithm.
- the UE sends a NAS security mode complete message to the MME.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the UE sends a NAS security mode complete message to the MME, including:
- the second hash value is consistent with the first hash value
- the second NAS-MAC is consistent with the first NAS-MAC
- the UE security capability returned by the MME is sent to the UE
- the UE security capability of the MME is consistent, and the UE sends a NAS security mode complete message to the MME.
- the method further includes:
- the UE sends a NAS security mode failure message to the MME;
- the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME, and the second hash value is If the first hash value is inconsistent, the UE sends a NAS security mode to the MME.
- the completion message, the NAS security mode completion message carries an attach request message.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes that the MME performs the UE capability information that has been received.
- the UE calculates a fourth NAS-MAC of the NAS security mode command message received by the UE; the UE determines whether the fourth NAS-MAC is consistent with the third NAS-MAC;
- the UE calculates a fourth hash value of the UE capability information sent by the UE to the MME according to the hash algorithm.
- the UE sends a NAS security mode complete message to the MME.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the UE sends a NAS security mode complete message to the MME, including:
- the fourth NAS-MAC is consistent with the third NAS-MAC, and the UE security capability returned by the MME is sent by the UE to The UE security capability of the MME is consistent, and the UE sends a NAS security mode complete message to the MME.
- the method further includes:
- the UE sends a NAS security mode failure message to the MME;
- the fourth NAS-MAC is consistent with the third NAS-MAC
- the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME
- the fourth hash value is If the third hash value is inconsistent, the UE sends a NAS security mode to the MME.
- the completion message, the NAS security mode completion message carries UE capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the UE calculates a sixth NAS-MAC of the NAS security mode command message received by the UE;
- the UE sends a NAS security mode complete message to the MME.
- the UE determines whether the sixth NAS-MAC is consistent with the fifth NAS-MAC
- the UE determines whether the security capability of the UE included in the UE capability information that the MME has received is consistent with the security capability of the UE sent by the UE to the MME;
- the UE determines whether the other capabilities of the UE capability information, other than the UE security capability, are consistent with the MME sent by the UE;
- the UE sends a NAS security mode complete message to the MME.
- the method further includes:
- the UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message carries UE capability information.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS-MAC of the NAS security mode command message. ;
- the UE calculates an eighth NAS-MAC of the NAS security mode command message received by the UE;
- the UE determines whether the security capability of the UE received by the MME is consistent with the security capability of the UE sent by the UE to the MME.
- the UE sends a NAS security mode complete message to the MME, where the NAS security mode complete message carries the second authentication match information and the NAS-MAC of the NAS security mode complete message.
- the second verification matching information includes:
- the second verification matching information includes: UE capability information of the UE.
- the method further includes:
- the UE Receiving, by the UE, a downlink NAS transmission message that is sent by the MME, where the downlink NAS transmission message carries a UE capability information request message or a request message requesting the UE to resend an attach request message;
- the UE sends an uplink information transmission message to the MME, where the uplink information transmission message carries the UE capability information or an attach request message.
- the method further includes:
- UE information request message carries a UE capability information request message or a request message requesting the UE to resend an attach request message
- the UE sends a UE information response message to the MME, where the UE information response message carries a UE capability information or an attach request message.
- an embodiment of the present invention provides a mobile communication method, including:
- the MME sends a NAS security mode command message to the UE, where the NAS security mode command message carries the first verification matching information, and the UE determines, according to the first verification matching information, the UE capability information that the MME has received. Whether the UE capability information sent by the UE to the MME is consistent; if they are consistent, the UE sends a NAS security mode complete message to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received
- the NAS security mode command message further includes the attach request that the MME has received.
- the hash algorithm used by the message for hash calculation, and the MME adopts The integrity algorithm, the secret key identifier, and the first non-access stratum message authentication NAS-MAC of the NAS security mode command message.
- the NAS security mode command message further includes: a UE security capability that the MME has received.
- the method further includes:
- the second NAS-MAC of the NAS security mode command message generated by the UE is consistent with the first NAS-MAC, the UE security capability returned by the MME, and the UE security sent by the UE to the MME
- the MME receives a NAS security mode complete message sent by the UE, where the NAS security mode is completed.
- the message carries an attach request message.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes that the MME performs the UE capability information that has been received.
- the NAS security mode command message further includes: a UE security capability that the MME has received.
- the method further includes:
- the fourth NAS-MAC of the NAS security mode command message generated by the UE is consistent with the third NAS-MAC, the UE security capability returned by the MME, and the UE security sent by the UE to the MME
- the MME receives the NAS security mode complete message sent by the UE, and the NAS security mode complete message The UE carries the capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the fifth NAS-MAC of the mode command message is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the method further includes:
- the MME receives the NAS security mode complete message sent by the UE, where the NAS security mode complete message carries the UE capability information.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS of the NAS security mode command message. -MAC.
- the method further includes:
- the MME receives the NAS security mode complete message sent by the UE, where the NAS security mode complete message carries the second authentication match information and the NAS-MAC of the NAS security mode complete message;
- the second verification matching information includes:
- the second verification matching information includes: UE capability information of the UE.
- the method further includes:
- the MME determines that the UE capability information that the MME has received is inconsistent with that sent by the UE, the MME sends a downlink NAS transmission message to the UE, where the downlink NAS transmission message carries UE capability information. Requesting a message or requesting the UE to resend the request message of the attach request message;
- the MME receives an uplink information transmission message sent by the UE, where the uplink information transmission message carries the UE capability information or an attach request message.
- the method further includes:
- the MME determines that the UE capability information that the MME has received is inconsistent with that sent by the UE, the MME sends a UE information request message to the UE, where the UE information request message carries a UE capability information request. a message or a request message requesting the UE to resend an attach request message;
- the MME receives the UE information response message sent by the UE, where the UE information response message carries the UE capability information or the attach request message.
- an embodiment of the present invention provides a mobile communication device, where the device is deployed in a UE, including:
- a receiving module configured to receive a non-access stratum NAS security mode from a mobility management entity MME a command message, where the NAS security mode command message carries first verification matching information for verifying UE capability information that the MME has received;
- a verification module configured to determine, according to the first verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME;
- the first sending module is configured to send a NAS security mode complete message to the MME when the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received before sending the NAS security mode command message to the UE, where the NAS security mode command message is further And including a hash algorithm used by the MME to perform hash calculation on the attached request message, an integrity algorithm used by the MME, a secret key identifier, and a first non-the NAS security mode command message.
- Access layer message authentication code NAS-MAC Access layer message authentication code
- the verification module is specifically configured to:
- the first sending module is configured to send the NAS to the MME when the two hash values are consistent with the first hash value and the second NAS-MAC is consistent with the first NAS-MAC. Safe mode completion message.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the verification module is further configured to:
- the first sending module is specifically configured to:
- the second hash value is consistent with the first hash value
- the second NAS-MAC is consistent with the first NAS-MAC
- the UE security capability returned by the MME is sent to the UE
- the security capabilities of the MME are the same, the NAS security mode complete message is sent to the MME.
- the first sending module is further configured to:
- the method is further configured to: if the second NAS-MAC is consistent with the first NAS-MAC, the security capability of the UE returned by the MME is consistent with the security capability of the UE sent by the UE to the MME, and the second If the hash value is inconsistent with the first hash value, the NAS security mode complete message is sent to the MME, where the NAS security mode complete message carries an attach request message.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes that the MME performs the UE capability information that has been received.
- the verification module is specifically configured to:
- the fourth hash value of the UE capability information sent by the UE to the MME is calculated according to the hash algorithm
- the first sending module is specifically configured to: if the packets are consistent, the UE sends a NAS security mode complete message to the MME.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the verification module is further configured to:
- the first sending module is specifically configured to:
- the fourth hash value is consistent with the third hash value
- the fourth NAS-MAC is consistent with the third NAS-MAC
- the UE security capability returned by the MME is sent by the UE to If the security capabilities of the MME are the same, the NAS security mode complete message is sent to the MME.
- the first sending module is further configured to:
- the UE sends a NAS security mode failure message to the MME;
- the first sending module is further configured to: if the fourth NAS-MAC is consistent with the third NAS-MAC, the UE security capability returned by the MME, and the UE security capability sent by the UE to the MME If the fourth hash value is inconsistent with the third hash value, the UE sends a NAS security mode complete message to the MME, where the NAS security mode complete message carries UE capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the verification module is specifically configured to:
- the first sending module is specifically configured to send a NAS security mode complete message to the MME if they are consistent.
- the verification module is specifically configured to:
- the UE determines whether the other capabilities of the UE capability information, other than the UE security capability, are consistent with the MME sent by the UE;
- the first sending module is specifically configured to send a NAS security mode complete message to the MME if they are consistent.
- the first sending module is further configured to:
- the security mode complete message carries the UE capability information in the NAS security mode complete message.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS-MAC of the NAS security mode command message. ;
- the verification module is specifically configured to:
- the first sending module is configured to send, to the MME, a NAS security mode complete message, where the NAS security mode complete message carries the second authentication match information and the NAS of the NAS security mode complete message.
- the second verification matching information includes:
- the second verification matching information includes: UE capability information of the UE.
- the receiving module is further configured to: after the first sending module sends a NAS security mode complete message to the MME, receive a downlink NAS transport message sent by the MME, where the downlink NAS transport message carries the UE a capability information request message or a request message requesting the UE to resend an attach request message;
- the first sending module is further configured to send an uplink information transmission message to the MME, where the uplink information transmission message carries the UE capability information or an attach request message.
- the receiving module is further configured to:
- the UE After the first sending module sends a NAS security mode complete message to the MME, the UE sends a UE information request message sent by the MME, where the UE information request message carries a UE capability information request message or requests the UE to resend an attach request. Request message of the message;
- the first sending module is further configured to send a UE information response message to the MME, where the UE information response message carries a UE capability information or an attach request message.
- an embodiment of the present invention provides a mobile communication device, where the device is deployed in an MME, and includes:
- a second sending module configured to send a NAS security mode command message to the UE, where the NAS security mode command message carries the first verification matching information, where the UE determines, according to the first verification matching information, Whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME; if they are consistent, the UE sends a NAS security mode complete message to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received
- the NAS security mode command message further includes the attach request that the MME has received.
- the message performs a hash algorithm, a hash algorithm used by the MME, an integrity algorithm used by the MME, a secret key identifier, and a first non-access stratum message authentication NAS-MAC of the NAS security mode command message.
- the NAS security mode command message further includes: a UE security capability that the MME has received.
- the device further includes: a first receiving module, configured to:
- the second NAS-MAC of the NAS security mode command generated by the UE is consistent with the first NAS-MAC, the UE security capability returned by the MME, and the UE security capability sent by the UE to the MME
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes that the MME performs the UE capability information that has been received.
- the NAS security mode command message further includes: a UE security capability that the MME has received.
- the device further includes: a second receiving module, configured to:
- the fourth NAS-MAC of the NAS security mode command message generated by the UE is consistent with the third NAS-MAC, the UE security capability returned by the MME, and the UE security sent by the UE to the MME Receiving a NAS security mode complete message sent by the UE when the fourth hash value of the UE capability information generated by the UE is inconsistent with the third hash value, where the NAS security mode complete message carries the UE Capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the fifth NAS-MAC of the mode command message is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and the NAS security adopted by the MME.
- the device further includes: a third receiving module, configured to:
- the sixth NAS-MAC of the NAS security mode command message generated by the UE is consistent with the fifth NAS-MAC.
- the UEs that are sent by the UE to the MME have the same security capability and the other capabilities of the UE that are determined by the MME to be received by the MME are other than the UE security capability, and the UE sends the MME to the MME.
- the NAS security mode complete message sent by the UE is received, where the NAS security mode complete message carries the UE capability information.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS of the NAS security mode command message. -MAC.
- the device further includes: a fourth receiving module, configured to receive a NAS security mode complete message sent by the UE, where the NAS security mode complete message carries the second verification matching information, and the NAS security mode is completed.
- a fourth receiving module configured to receive a NAS security mode complete message sent by the UE, where the NAS security mode complete message carries the second verification matching information, and the NAS security mode is completed.
- the second verification matching information includes:
- the second verification matching information includes: UE capability information of the UE.
- the second sending module is further configured to: if the UE capability information that the MME has received is inconsistent with that sent by the UE, send a downlink NAS transmission message to the UE, where the downlink NAS is Transmitting a message that carries a UE capability information request message or requesting the UE to resend an attach request message;
- the fourth receiving module is further configured to receive an uplink information transmission message sent by the UE, where the uplink information transmission message carries the UE capability information or an attach request message.
- the second sending module is further configured to: if the MME determines that the UE capability information that the MME has received is inconsistent with that sent by the UE, send a UE information request message to the UE,
- the UE information request message carries a UE capability information request message or a request message requesting the UE to resend an attach request message;
- the fourth receiving module is further configured to receive a UE information response message sent by the UE, where the UE information response message carries a UE capability information or an attach request message.
- an embodiment of the present invention provides a mobile communication device, where the device is deployed in a UE, including:
- a communication interface a memory, a processor, and a communication bus, wherein the communication interface, the memory, and the processor communicate via the communication bus;
- the memory is for storing a program
- the processor is configured to execute the program stored by the memory; when the mobile communication device is running, the processor runs a program, the program comprising:
- NAS security mode command message carries first verification matching information for verifying UE capability information that the MME has received;
- NAS security mode complete message is sent to the MME.
- an embodiment of the present invention provides a mobile communication device, where the device is deployed in an MME, and includes:
- a communication interface a memory, a processor, and a communication bus, wherein the communication interface, the memory, and the processor communicate via the communication bus;
- the memory is for storing a program
- the processor is configured to execute the program stored by the memory; when the mobile communication device is running, the processor runs a program, the program comprising:
- NAS security mode command message carries the first verification matching information
- the UE determines, according to the first verification matching information, whether the UE capability information that the MME has received is And the UE capability information sent by the UE to the MME is consistent; if they are consistent, the UE sends a NAS security mode complete message to the MME.
- the UE verifies, according to the received first verification matching message, whether the UE capability information that the MME has received is consistent with the capability information of the UE that is sent by the UE to the MME, and the MME returns the verification matching message in the embodiment of the present invention.
- the method of verifying the UE capability information received by the MME ensures that the MME has the correct UE capability information, and the Attach Request message in the Attach process does not have the NAS security context protection, and the attacker may modify the UE capability. Information, the MME cannot obtain the correct UE capability and the DoS attack problem.
- DoS is the abbreviation of Denial of Service, that is, denial of service, causing DoS attacks to be called DoS attacks.
- FIG. 1 is a flow chart showing a mobile communication method according to an embodiment of the present invention.
- FIG. 2 is a flowchart of a mobile communication method according to Embodiment 2 of the present invention.
- FIG. 3 is a flowchart of a third mobile communication method according to Embodiment 3 of the present invention.
- FIG. 4 is a flow chart showing a method for mobile communication according to Embodiment 4 of the present invention.
- FIG. 5 is a flowchart of a mobile communication method according to Embodiment 5 of the present invention.
- FIG. 6 is a flow chart showing a sixth method of mobile communication according to Embodiment 6 of the present invention.
- FIG. 7 is a flow chart showing a method for mobile communication according to Embodiment 7 of the present invention.
- FIG. 8 is a flowchart of a mobile communication method according to Embodiment 8 of the present invention.
- FIG. 9 is a flowchart showing a mobile communication method according to Embodiment 9 of the present invention.
- FIG. 10 is a flowchart showing a ten mobile communication method according to an embodiment of the present invention.
- FIG. 11 is a flowchart showing a mobile communication method according to Embodiment 11 of the present invention.
- FIG. 12 is a flowchart showing a mobile communication method according to Embodiment 12 of the present invention.
- FIG. 13 is a flowchart showing a mobile communication method according to Embodiment 15 of the present invention.
- FIG. 14 is a flowchart showing a mobile communication method according to Embodiment 16 of the present invention.
- FIG. 15 is a schematic structural diagram of a mobile communication apparatus according to Embodiment 1 of the present invention.
- FIG. 16 is a schematic structural diagram of a mobile communication apparatus according to Embodiment 2 of the present invention.
- FIG. 17 is a schematic structural diagram of a mobile communication device according to Embodiment 1 of the present invention.
- FIG. 18 is a schematic structural diagram of a mobile communication device according to Embodiment 2 of the present invention.
- FIG. 1 is a flow chart showing a mobile communication method according to an embodiment of the present invention. As shown in FIG. 1, the main processing steps of Embodiment 1 of the present invention include:
- Step S11 The UE receives a NAS (Non-Access Stratum) security mode command (NAS Security Mode Command) message from the MME, where the NAS security mode command message carries the UE capability for the MME.
- the first verification match information for which the information is verified.
- the UE sends an attach request (Attach Request) message to the MME by using the eNB, where the attach request message carries UE Capability information.
- the specific UE capability information includes: UE network capability, and the UE network capability is the UE security capability and the mobile network capability (MS network capability, where the English of the MS is the mobile station and the Chinese name is the mobile station). , Mobile station class 2, Mobile station class 3, Supported Codecs, Additional update type, voice domain priority, and user usage settings (Voice domain preference and UE's usage setting), mobile network function support (MS network feature support).
- the attach request message sent by the UE to the MME may not have integrity protection, and thus may be attacked by a man-in-the-middle, so that the UE capability information in the attach request message received by the MME is inconsistent with that sent by the UE to the MME, so that the MME cannot obtain the MME. Correct UE capability information.
- the MME sends the first authentication matching information to the UE through the NAS security mode command message during the NAS security activation process, and the UE determines, according to the first verification matching information, the UE capability that the MME has received. Whether the information is consistent with that sent by the UE.
- Step S12 The UE determines, according to the first verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- Step S13 If they are consistent, the UE sends a NAS security mode complete message to the MME.
- the UE verifies, according to the received first verification matching message, whether the UE capability information that the MME has received is consistent with the capability information of the UE that is sent by the UE to the MME, and the MME returns the verification matching message in the embodiment of the present invention.
- the method of verifying the UE capability information received by the MME ensures that the MME has the correct UE capability information, and the Attach Request message in the Attach process does not have the NAS security context protection, and the attacker may modify the UE capability.
- the information that the MME cannot obtain the correct UE capability causes the DoS attack problem.
- the DoS is the abbreviation of the Denial of Service, that is, the denial of service, and the DoS attack behavior is called a DoS attack.
- the first verification matching information may have multiple different implementation manners, which will be described below in conjunction with specific embodiments.
- an MME performs a hash calculation on a received attach request message to obtain a hash value of an attach request message, and uses a NAS security mode command message to
- the hash value of the attach request message is sent to the UE to determine whether the UE capability information received by the MME is consistent with that sent by the UE to the MME by using the UE to verify the hash value of the attach request message, as shown in FIG.
- the main processing steps include:
- Step S21 The UE receives a NAS security mode command message from the MME.
- the first authentication matching message carried in the NAS security mode command message is that the MME performs a hash calculation on the attach request message received in the attaching process to obtain a first hash value of the attach request message, where the NAS security mode command message further includes The hash algorithm (optional carrying) used by the MME to perform hash calculation on the already received attach request message, the integrity algorithm used by the MME, the key identifier, and the first NAS-MAC of the NAS security mode command message (Non - Access Stratum UEssage Authentication Code, where the first NAS-MAC is used to protect the integrity of the NAS security mode command message.
- the NAS security mode command message may further include an encryption algorithm supported by the MME and the UE, optionally carrying an optional [IMEI (International Mobile Equipment Identity) request] and optional carrying. in idle mobile mapped security context [nONCE UE, nONCE MME], wherein, nONCE UE random number selected by the UE, nONCE MME means a random number selected MME.
- IMEI International Mobile Equipment Identity
- Step S22 The UE calculates a second NAS-MAC of the NAS security mode command message received by the UE.
- the UE performs the integrity protection on the sent NAS security mode command message by using the MME, and calculates the NAS security mode command message received by the UE to obtain the second NAS-MAC.
- the first NAS-MAC will be consistent with the second NAS-MAC.
- Step S23 The UE determines whether the second NAS-MAC is consistent with the first NAS-MAC. If they are consistent, step S24 is performed. If not, step S27 is performed.
- Step S24 The UE calculates a second hash value of the attach request message sent by the UE to the MME according to the hash algorithm.
- the UE uses a hash algorithm to perform an attach request message sent by the UE to the MME in the attach procedure. Hash calculation, if the attach request message is not modified by the intermediary in the attach process, the second hash value calculated by the UE is consistent with the first hash value in the NAS security mode command message.
- the hash value of the attach request message is carried in the NAS security mode command message, which can shorten the length of the attach request message and improve the information sending rate.
- Step S25 The UE determines whether the second hash value is consistent with the first hash value. If they are consistent, step S26 is performed, otherwise step S27 is performed.
- Step S26 The UE sends a NAS Security Mode Complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S27 The UE sends a NAS Security Mode Reject message to the MME.
- the UE verifies the integrity of the received NAS security mode command message and the hash value of the attach request message received by the MME, when the second hash value is consistent with the first hash value and the second
- the UE determines that the NAS security mode command message received by the UE is not modified, and the attach request message received by the MME in the UE attach procedure is consistent with that sent by the UE to the MME, thereby ensuring that the MME receives the message.
- the UE capability information in the attached attach request message is consistent with the UE capability information sent by the UE.
- the UE verifies the UE capability received by the MME by verifying the hash value of the MME attachment request message, and ensures that the UE capability information received by the MME is correct UE capability information.
- the first verification matching message may occupy an IE (Information Element) of the MME backhaul UE security capability in the existing specification, and may also use a new IE for transmission.
- IE Information Element
- FIG. 3 is a flowchart of a mobile communication method according to Embodiment 3 of the present invention.
- the MME sends the received UE security capability and the hash value of the attach request message to the UE through the NAS security mode command message to pass the UE. Verification of the attachment request message hash value and the UE security capability, Determining whether the UE capability information received by the MME is consistent with that sent by the UE to the MME.
- the main processing steps of the method include:
- Step S31 The UE receives a NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is that the MME performs a hash calculation on the attach request message received in the attaching process to obtain a first hash value of the attach request message, where the NAS security mode command message further includes the MME.
- the first NAS-MAC which identifies the first NAS-MAC of the NAS security mode command message, is used to protect the integrity of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, and optionally may also include [IMEI (International Mobile Equipment Identity) request] and optionally carried [ NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME is a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- Step S32 The UE calculates a second NAS-MAC of the NAS security mode command message received by the UE.
- the UE performs the integrity protection on the sent NAS security mode command message by using the MME, and calculates the NAS security mode command message received by the UE to obtain the second NAS-MAC.
- the first NAS-MAC will be consistent with the second NAS-MAC.
- Step S33 The UE determines whether the second NAS-MAC is consistent with the first NAS-MAC. If they are consistent, step S34 is performed. If not, step S36 is performed.
- Step S34 The UE calculates a second hash value of the attach request message sent by the UE to the MME according to the hash algorithm, determines whether the second hash value is consistent with the first hash value, and whether the UE security capability returned by the MME is related to the UE.
- the security capabilities of the UEs sent to the MME are the same. (The calculation of the hash value, the confirmation of the hash value, and the confirmation order of the UE security capabilities are not limited.) If both are consistent, step S35 is performed, otherwise step S36 is performed.
- the UE uses a hash algorithm to perform an attach request message sent by the UE to the MME in the attach procedure. Hash calculation, if the attach request message is not modified by the intermediary in the attach process, the second hash value calculated by the UE is consistent with the first hash value in the NAS security mode command message.
- the hash value of the attach request message is carried in the NAS security mode command message, which can shorten the length of the attach request message and improve the information sending rate.
- Step S35 The UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S36 The UE sends a NAS security mode failure message to the MME.
- the UE verifies the UE capability received by the MME by verifying the hash value of the attach request message received by the MME and the UE security capability, and ensures that the UE capability information received by the MME is the correct UE capability. information,
- the first verification matching message can only be transmitted by using a new IE.
- an MME sends a received UE security capability and a hash value of an attach request message to a UE through a NAS security mode command message to pass the UE.
- a NAS security mode command message For the verification of the attachment request message hash value and the security capability of the UE, it is determined whether the UE capability information received by the MME is consistent with that sent by the UE to the MME.
- the main processing steps of the method include:
- Step S41 The UE receives the NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is that the MME performs a hash calculation on the attach request message received in the attaching process to obtain a first hash value of the attach request message, where the NAS security mode command message further includes the MME.
- the UE security capability received in the attach procedure, the hash algorithm used by the MME to perform hash calculation on the already received attach request message (optional carrying), the integrity algorithm used by the MME, the secret key identifier, and the NAS security mode The first NAS-MAC of the command message, the first NAS-MAC is used to protect the integrity of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME refers to a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- NONCE MME refers to a random number selected by the MME.
- Step S42 The UE calculates the second of the NAS security mode command message received by the UE. NAS-MAC.
- Step S43 The UE determines whether the second NAS-MAC is consistent with the first NAS-MAC. If they are consistent, step S44 is performed. If not, step S48 is performed.
- Step S44 The UE determines whether the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME. If they are consistent, step S45 is performed; otherwise, step S48 is performed.
- Step S45 The UE determines whether the second hash value is consistent with the first hash value. If yes, step S46 is performed. If not, step S47 is performed.
- the calculation of the second hash value is the same as that of the foregoing embodiment, and details are not described herein again.
- Step S46 The UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S47 The UE sends a NAS security mode complete message to the MME, where the message carries an attach request message or a UE capability.
- the NAS security mode complete message sent in this step may optionally carry [IMEI] and carry the NAS-MAC that performs security protection on the NAS security mode complete message.
- Step S48 The UE sends a NAS security mode failure message to the MME.
- the NAS security context is actually established between the UE and the MME, so when the integrity verification of the hash value of the attach request message fails, The content of the Attach Request can be re-uploaded directly in the integrity-protected NAS Security Mode Complete message.
- the third embodiment adopts the method: even if the UE security capabilities and the NAS-MAC are complete.
- the NAS security context has been established between the UE and the MME. If the integrity verification of the hash value of the Attach Request message fails, the UE also sends a NAS Security Mode Reject message.
- the first verification matching message can only be transmitted by using a new IE.
- FIG. 5 is a flowchart of a mobile communication method according to Embodiment 5 of the present invention.
- the MME performs hash calculation on the received UE capability information to obtain a hash value of the UE capability, and uses the NAS security mode command message to send the UE.
- the hash value of the capability information is sent to the UE to determine whether the UE capability information received by the MME is consistent with that sent by the UE to the MME by using the UE to verify the UE capability hash value.
- the main processing of the method is performed. The steps include:
- Step S51 The UE receives a NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is a third hash value obtained by the MME for performing hash calculation on the UE capability information received in the attaching process, and the NAS security mode command message further includes the MME.
- a hash algorithm (optional carrying) used for hashing the received UE capability information, an integrity algorithm supported by the MME and the UE, a secret key identifier, and a third NAS of the NAS security mode command message.
- MAC Non-Access Stratum UEssage Authentication Code
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME refers to a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- NONCE MME refers to a random number selected by the MME.
- Step S52 The UE calculates a fourth NAS-MAC of the NAS security mode command message received by the UE.
- the UE uses the MME to perform integrity protection on the sent NAS security mode command message, and calculates the NAS security mode command message received by the UE to obtain a fourth NAS-MAC.
- the third NAS-MAC will be consistent with the fourth NAS-MAC.
- Step S53 The UE determines whether the fourth NAS-MAC is consistent with the third NAS-MAC. If yes, step S54 is performed. Otherwise, step S57 is performed.
- Step S54 The UE calculates a fourth hash value of the UE capability information sent by the UE to the MME according to the hash algorithm.
- the UE uses the hash algorithm to perform hash calculation on the UE capability information that the UE sends to the MME in the attach procedure. If the UE capability information in the UE capability information is not modified by the intermediary in the attach procedure, the UE calculates the fourth hash. The value will match the third hash value in the NAS security mode command message.
- the hash value of the UE capability information is carried in the NAS security mode command message, which can shorten the capability information length of the UE and improve the information transmission rate.
- Step S55 The UE determines whether the fourth hash value is consistent with the third hash value. If they are consistent, the step is executed. Step S56, otherwise step S57 is performed.
- Step S56 The UE sends a NAS Security Mode Complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S57 The UE sends a NAS Security Mode Reject message to the MME.
- the UE verifies the integrity of the received NAS security mode command message and the hash value of the UE capability information received by the MME, when the fourth hash value is consistent with the third hash value and fourth.
- the UE determines that the NAS security mode command message received by the UE is not modified, and the UE capability information received by the MME in the UE attach procedure is consistent with that sent by the UE to the MME, thereby ensuring that the MME receives the MME.
- the obtained UE capability information is consistent with the UE capability information sent by the UE.
- the hash value of the UE capability information and the integrity check of the NAS-MAC are at least one failure, it indicates that at least one of the UE capability information and the NAS security mode command received by the MME is modified by the attack, and the UE sends the MME to the MME.
- NAS Security Mode Reject message When the hash value of the UE capability information and the integrity check of the NAS-MAC are at least one failure, it indicates that at least one of the UE capability information and the NAS security mode command received by the MME is modified by the attack, and the UE sends the MME to the MME.
- the UE verifies the UE capability information received by the MME by verifying the hash value of the UE capability information of the MME, and ensures that the UE capability information received by the MME is the correct UE capability information.
- the first verification matching message may occupy the IE of the MME backhaul UE security capability in the existing specification, or may use a new IE for transmission.
- FIG. 6 is a flowchart of a mobile communication method according to Embodiment 6 of the present invention.
- an MME sends a received UE security capability and a hash value of UE capability information to a UE through a NAS security mode command message to pass the UE.
- the main processing steps of the method include:
- Step S61 The UE receives the NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is a third hash value obtained by the MME for performing hash calculation on the UE capability information received in the attaching process, and the NAS security mode command message further includes the MME.
- UE security energy received in the attach process The hash algorithm used by the MME to perform hash calculation on the received UE capability information (optional carrying), an integrity algorithm supported by the MME and the UE, the secret key identifier, and the NAS security mode command message
- the third NAS-MAC is used to protect the integrity of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME refers to a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- NONCE MME refers to a random number selected by the MME.
- Step S62 The UE calculates a fourth NAS-MAC of the NAS security mode command message received by the UE.
- the UE uses the MME to perform integrity protection on the sent NAS security mode command message, and calculates the NAS security mode command message received by the UE to obtain a fourth NAS-MAC.
- the third NAS-MAC will be consistent with the fourth NAS-MAC.
- Step S63 The UE determines whether the fourth NAS-MAC is consistent with the third NAS-MAC. If yes, step S64 is performed; otherwise, step S66 is performed.
- Step S64 The UE calculates a fourth hash value of the UE capability information sent by the UE to the MME according to the hash algorithm, determines whether the fourth hash value is consistent with the third hash value, and whether the UE security capability returned by the MME is related to the UE.
- the security capabilities of the UEs sent to the MME are the same (the calculation of the hash value, the confirmation of the hash value, and the confirmation order of the UE security capabilities are not specified). If they are all consistent, step S65 is performed, otherwise step S66 is performed.
- Step S65 The UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S66 The UE sends a NAS security mode failure message to the MME.
- the UE verifies the UE capability received by the MME by verifying the hash value of the MME's UE capability information and the UE security capability, and ensures that the UE capability information received by the MME is the correct UE capability information book.
- the first verification matching message can only Use a new IE for transmission.
- FIG. 7 is a flowchart of a mobile communication method according to Embodiment 7 of the present invention.
- the MME sends the received UE security capability and the hash value of the UE capability information to the UE through the NAS security mode command message to pass the UE.
- the main processing steps of the method include:
- Step S71 The UE receives the NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is a third hash value obtained by the MME for performing hash calculation on the UE capability information received in the attaching process, and the NAS security mode command message further includes the MME.
- a hash algorithm (optional carrying) used by the MME to perform hash calculation on the received UE capability information, an integrity algorithm supported by the MME and the UE, and a secret key
- the third NAS-MAC which identifies the NAS security mode command message, is used to protect the integrity of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ].
- IMEI International Mobile Equipment Identity
- Step S72 The UE calculates a fourth NAS-MAC of the NAS security mode command message received by the UE.
- Step S73 The UE determines whether the fourth NAS-MAC is consistent with the third NAS-MAC. If yes, step S74 is performed. Otherwise, step S78 is performed.
- Step S74 The UE determines whether the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME. If they are consistent, step S75 is performed; otherwise, step S78 is performed.
- Step S75 The UE determines whether the fourth hash value is consistent with the third hash value. If they are consistent, step S76 is performed. If not, step S77 is performed.
- Step S76 The UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S77 The UE sends a NAS security mode complete message to the MME, where the message carries UE capability information.
- the NAS security mode completion message sent in this step may optionally carry the [IMEI] and the NAS-MAC carrying the security protection for the NAS security mode completion message, in addition to the UE capability information.
- Step S78 The UE sends a NAS security mode failure message to the MME.
- the first verification matching message can only be transmitted by using a new IE.
- FIG. 8 is a flowchart of a mobile communication method according to Embodiment 8 of the present invention.
- the MME sends the UE capability information received in the attach procedure to the UE through the NAS security mode command message, so as to implement the UE capability by the UE. Verification of the information, as shown in Figure 8, the main processing steps of the method include:
- Step S81 The UE receives the NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is the UE capability information that the MME has received in the attaching process, and the NAS security mode command message further includes an integrity algorithm and a secret key identifier supported by the MME and the UE. And the fifth NAS-MAC of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME refers to a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- NONCE MME refers to a random number selected by the MME.
- Step S82 The UE calculates a sixth NAS-MAC of the NAS security mode command message received by the UE.
- Step S83 The UE determines whether the sixth NAS-MAC is consistent with the fifth NAS-MAC. If yes, step S84 is performed; otherwise, step S86 is performed.
- Step S84 The UE determines whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- Step S85 If they are consistent, the UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S86 If the inconsistent UE sends a NAS Security Mode Reject message to the MME.
- the first verification matching message may occupy the IE of the MME backhaul UE security capability in the existing specification, or may use a new IE for transmission, or the first verification match.
- UE capabilities other than UE security capabilities in the message are transmitted using a new IE.
- FIG. 9 is a flowchart of a mobile communication method according to Embodiment 9 of the present invention.
- an MME sends UE capability information received in an attach procedure to a UE through a NAS security mode command message, to implement UE capability information by using the UE.
- Verification as shown in Figure 9, the main processing steps of the method include:
- Step S91 The UE receives the NAS security mode command message from the MME.
- the first authentication matching message carried by the NAS security mode command message is the UE capability information that the MME has received in the attaching process, and the NAS security mode command message further includes an integrity algorithm and a secret key identifier supported by the MME and the UE. And the fifth NAS-MAC of the NAS security mode command message.
- the security mode command message may further include an encryption algorithm supported by the MME and the UE, an optional [IMEI (International Mobile Equipment Identity) request], and an optional [NONCE UE , NONCE MME ], where the NONCE UE is a random number selected by the UE, and the NONCE MME refers to a random number selected by the MME.
- IMEI International Mobile Equipment Identity
- NONCE MME refers to a random number selected by the MME.
- Step S92 The UE calculates a sixth NAS-MAC of the NAS security mode command message received by the UE.
- Step S93 The UE determines whether the sixth NAS-MAC is consistent with the fifth NAS-MAC. If they are consistent, step S94 is performed, otherwise step S98 is performed.
- Step S94 The UE determines whether the security capability of the UE included in the UE capability information returned by the MME is consistent with the security capability of the UE sent by the UE to the MME. If they are consistent, step S95 is performed; otherwise, step S98 is performed.
- Step S95 The UE determines whether the capabilities of the UE capability information returned by the MME are the same as those of the UE to be sent to the MME respectively. If the process is consistent with the step S96, the process proceeds to step S97.
- Step S96 The UE sends a NAS security mode complete message to the MME.
- the NAS security mode completion message may optionally carry [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message.
- Step S97 The UE sends a NAS security mode complete message to the MME, where the NAS security mode complete message carries the UE capability.
- the NAS security mode completion message sent in this step can be carried in addition to the UE capability information. [IMEI] and NAS-MAC carrying security protection for NAS security mode completion messages
- Step S98 The UE sends a NAS Security Mode Reject message to the MME.
- the first verification matching message may occupy the IE of the MME backhaul UE security capability in the existing specification, or may use a new IE for transmission, or the UE security capability in the first verification matching message.
- the UE capabilities outside are transmitted using a new IE.
- FIG. 10 is a flowchart of a tenth mobile communication method according to an embodiment of the present invention.
- a UE sends a second verification matching message to an MME in a NAS security mode complete message.
- the tenth embodiment of the present invention is shown in FIG.
- the main processing steps of the method include:
- Step S101 The MME receives a NAS (Non-Access Stratum) security mode complete (NAS Security Mode Complete) message from the UE, where the NAS security mode complete message carries the UE capability for the MME.
- the second verification match information for which the information is verified.
- Step S102 The MME determines, according to the second verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- the second verification matching information may have multiple different implementation manners, which will be described below in conjunction with specific embodiments.
- FIG. 11 is a flowchart of a mobile communication method according to an eleventh embodiment of the present invention.
- the MME sends the UE security capability information received in the attach procedure to the UE through the NAS security mode command message, as shown in FIG.
- the main processing steps of the method in the eleventh embodiment of the present invention include:
- Step S111 The UE receives a NAS security mode command message from the MME.
- the NAS security mode command message carries the UE security capability that the MME has received in the attach procedure, the integrity algorithm used by the MME, and optionally the Hash algorithm, the secret key identifier, and the seventh NAS of the NAS security mode command message. -MAC.
- the NAS security mode command message may further include an encryption algorithm supported by the MME and the UE, optionally carrying an [IMEI request], and optionally carrying [NONCE UE , NONCE MME ], where the NONCE UE is a UE.
- the selected random number, NONCE MME refers to the random number selected by the MME.
- Step S112 The UE calculates an eighth NAS-MAC of the NAS security mode command message received by the UE.
- Step S113 The UE determines whether the eighth NAS-MAC is consistent with the seventh NAS-MAC. If yes, step S114 is performed; otherwise, step S116 is performed.
- Step S114 The UE determines whether the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME.
- Step S115 If the UE is consistent, the UE sends a NAS security mode complete message to the MME, where the NAS security mode complete message carries the second verification match information and the NAS security mode complete message for the MME to verify the received UE capability information.
- NAS-MAC NAS-MAC
- the second verification matching message is sent to the MME, and the MME may use the received second verification matching information to receive in the attaching process.
- the UE capability information is verified to ensure that the MME obtains the correct UE capability information.
- the second verification matching message sent by the UE to the MME may also be a hash value of the attach request message that the UE has sent to the MME in the attach procedure; or the UE capability information that the UE has sent to the MME in the attach procedure.
- the NAS security mode completion message may optionally carry a hash algorithm (optional carrying) used by the UE, [IMEI], and a NAS-MAC carrying security protection for the NAS security mode completion message.
- the MME After receiving the hash value of the attach request message sent by the UE or the hash value of the UE capability information, the MME performs a hash calculation on the attach request message or the UE capability information received in the attach process by using a hash algorithm, and uses the calculation The result determines whether the attach request message or UE capability received by the MME in the attach procedure is consistent with that sent by the UE.
- the MME requests the UE to resend the UE capability information or the attached request content after the NAS is activated.
- the specific implementation manner includes:
- the MME sends a Downlink NAS Transport message to the eNB, where the downlink NAS transport message includes a UE Capability Request message or an Attach Request Contents Request message;
- the eNB sends a downlink information transmission (Downlink Information Transfer) message to the UE, where the downlink information transmission message includes a UE Capability Request message or an Attach Request Contents Request message;
- Downlink Information Transfer Downlink Information Transfer
- the UE sends an uplink information transmission (Uplink Information Transfer) message to the eNB.
- Uplink Information Transfer Contains UE capabilities or Attach request contents;
- the eNB sends an Uplink NAS Transport message to the MME, including UE capabilities or Attach request contents;
- the MME sends a UE Information Request (UE Information Request) message to the eNB, where the UE information request includes a UE Capability Request message or an Attach Request Contents Request message;
- UE Information Request UE Information Request
- the eNB sends a UE Information Request (UE InformationRequest) message to the UE;
- the UE sends a UE Information Response (UE InformationResponse) message to the eNB, where the UE information response message carries the UE capability or the Attach request contents;
- UE Information Response UE InformationResponse
- the eNB sends a UE Information Response (UE InformationResponse) message to the MME, where the UE information response message carries the UE capabilities or the Attach request contents.
- UE Information Response UE InformationResponse
- Step S116 If not, the UE sends a NAS Security Mode Reject message to the MME.
- FIG. 12 is a flowchart of a mobile communication method according to Embodiment 12 of the present invention.
- the MME sends the UE security capability information received in the attach procedure to the UE through the NAS security mode command message, as shown in FIG.
- the main processing steps of the twelfth embodiment of the present invention include:
- Step S121 The UE receives a NAS security mode command message from the MME.
- the NAS security mode command message carries the UE security capability that the MME has received in the attach procedure, an integrity algorithm supported by the MME and the UE, an optional Hash algorithm, a secret key identifier, and a NAS security mode command message.
- the seventh NAS-MAC The seventh NAS-MAC.
- the NAS security mode command message may further include an encryption algorithm supported by the MME and the UE, an optionally carried [IMEI request], and optionally carried [NONCEUE, NONCEMME].
- Step S122 The UE calculates an eighth NAS-MAC of the NAS security mode command message received by the UE.
- Step S123 The UE determines whether the eighth NAS-MAC is consistent with the seventh NAS-MAC, if one Then, step S124 is performed, otherwise, step S126 is performed.
- Step S124 The UE determines whether the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME.
- Step S125 If they are consistent, the UE sends a NAS security mode complete message to the MME, where the NAS security mode complete message carries the UE capability information and the NAS-MAC of the NAS security mode complete message.
- the UE capability information is sent to the MME.
- the NAS security mode completion message may optionally carry the [IMEI] and carry the NAS-MAC that secures the NAS security mode completion message, so that the UE capability information in the NAS security mode completion message is not modified, and the MME is guaranteed to be obtained. Correct UE capability information.
- Step S126 If not, the UE sends a NAS Security Mode Reject message to the MME.
- the UE capability information may be transmitted in the second verification matching information IE, but the MME directly saves the UE capability information, and does not verify whether the UE capability information and the UE capability in the attached request have been received again.
- the information is the same.
- the present invention also provides a thirteenth embodiment of the mobile communication method.
- the main processing steps of the method include: the MME sends a NAS security mode command message to the UE, where the NAS security mode command message carries the first verification matching information, and is used by the UE. And determining, according to the first verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information that is sent by the UE to the MME; if they are consistent, the UE sends a NAS security mode completion message to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received
- the NAS security mode command message further includes an attach that the MME has received.
- the request message performs a hash algorithm (optional carrying) used for hash calculation, an integrity algorithm used by the MME, a secret key identifier, and a first non-access stratum message authentication NAS-MAC of the NAS security mode command message.
- the method further includes:
- the second NAS-MAC of the NAS security mode command message generated by the UE is consistent with the first NAS-MAC, and the security capability of the MME backhaul is the same as the security capability of the UE sent by the UE to the MME, and the second request of the UE is generated.
- the MME receives the NAS security mode complete message sent by the UE, where the NAS security mode complete message carries an attach request message or UE capability.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes the UE that the MME has received.
- the capability information is hash algorithm (optional carrying) used for hash calculation, the integrity algorithm used by the MME, the secret key identifier, and the third NAS-MAC of the NAS security mode command message.
- the method further includes:
- the fourth NAS-MAC generated by the UE is consistent with the third NAS-MAC, and the UE security capability of the MME backhaul is the same as the UE's security capability transmitted by the UE to the MME, and the fourth hash value and the third of the UE capability information generated by the UE are the third.
- the MME receives the NAS security mode complete message sent by the UE, and the NAS security mode complete message carries the UE capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and a NAS adopted by the MME.
- the fifth NAS-MAC of the security mode command message is UE capability information that the MME has received
- the method further includes:
- the UE's security capability in the UE capability information that the MME has received is consistent with the security capability of the UE that the UE sends to the MME and the UE capability information that the MME has received.
- the UE sends a NAS security mode complete message to the MME, and the NAS security mode complete message carries the UE capability information.
- the present invention further provides Embodiment 14 of the mobile communication method, and the main processing steps of the embodiment include:
- the MME receives a NAS (Non-Access Stratum) security mode complete (NAS Security Mode Complete) message from the UE, where the NAS security mode complete message carries the UE capability for the MME that has been received.
- the second verification match information for which the information is verified.
- the MME determines, according to the second verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- the second verification matching information includes:
- the hash value of the attach request message that the UE has sent to the MME or
- the hash value of the UE capability information that the UE has sent to the MME is the hash value of the UE capability information that the UE has sent to the MME.
- the second verification matching information includes: UE capability information that the UE has sent to the MME.
- the method further includes:
- the MME sends a downlink NAS transport message to the UE, where the downlink NAS transport message carries the UE capability information request message or the attach request content request message.
- the MME receives the uplink information transmission message sent by the UE, where the uplink information transmission message carries the UE capability information or the attached request content.
- the method further includes:
- the MME sends a UE information request message to the UE, where the UE information request message carries the UE capability information request message or the attach request content request message.
- the MME receives the UE information response message sent by the UE, and the UE information response message packet carries the UE capability information or the attached request content.
- FIG. 13 is a flowchart of a mobile communication method according to Embodiment 15 of the present invention, in which a NAS security activation process (corresponding to step 7 in FIG. 13) is performed according to an existing method, and after the NAS security activation, the MME passes the downlink NAS.
- the Downlink NAS Transport message requests the UE to re-upload the UE capabilities or the Attach request contents, and the UE uploads the UE capabilities or attaches the request content through the Up NAS Transport message. Attach request contents), so that the MME obtains the correct UE capabilities.
- the execution process of this embodiment includes:
- the UE in the RRC_IDLE (Radio Resource Control IDLE) state performs the attach procedure, firstly initiates a random access procedure, that is, sends a first random access message MSG1;
- the eNB After detecting the MSG1 message, the eNB sends a random access response message, that is, an MSG2 message, to the UE.
- the eNB sends an RRC Connection Setup message to the UE, including establishing an SRB1 (signaling radio bearer1) and radio resource configuration information.
- SRB1 signaling radio bearer1
- the UE After the completion of the SRB1 bearer and the radio resource configuration, the UE sends an RRC Connection Setup Complete message to the eNB, where the RRC update complete message includes an attach request message of the NAS layer.
- the eNB selects the MME, and sends an initial UE message to the MME, where the initial UE message includes an attach request (Attach Request) message of the NAS layer;
- the UE and the MME perform an AKA and NAS security activation process
- the MME sends a Downlink NAS Transport message to the eNB, where the downlink NAS transport message includes a UE Capability Request message or an Attach Request Contents Request message;
- the eNB sends a downlink information transmission (Downlink Information Transfer) message to the UE, where the downlink information transmission message includes a UE Capability Request message or an Attach Request Contents Request message;
- Downlink Information Transfer Downlink Information Transfer
- the UE sends an Uplink Information Transfer message to the eNB, including UE capabilities or Attach request contents.
- the eNB sends an Up NAS Transport message to the MME, including UE capabilities or Attach request contents.
- the MME sends an Initial Context Setup Request message to the eNB, requesting to establish a default bearer, where the initial context setup request message includes a NAS layer attach request (Attach Accept) and an Activate Default EPS Bearer Context Request (activate default).
- the evolved packet core network bears the context request message, wherein the EPS is spelled Evolved Packet Core, and the Chinese name is the evolved packet core network;
- the eNB After the eNB receives the initial context setup request message, if the initial context setup request message does not include the UE capability information, the eNB sends a UE Capability Enquiry message to the UE to query the UE capability.
- the UE sends a UE Capability Information message to the eNB, and reports UE capability information.
- the eNB sends a UE Capability Information Indication message to the MME, and updates the UE capability information of the MME.
- the eNB sends a security mode command (Security Mode Command) message to the UE according to the security information supported by the UE in the initial context setting request (Initial Context Setup Request) message, and performs security activation;
- a security mode command Security Mode Command
- Initial context setting request Initial Context Setup Request
- the UE sends a Security Mode Complete message to the eNB, indicating that the security activation is completed.
- the eNB sends an RRC Connection Reconfiguration (RRC Connection Reconfiguration) message to the UE according to the ERAB (Evolved Radio Access Bearer) setup information in the Initial Context Setup Request message.
- RRC Connection Reconfiguration RRC Connection Reconfiguration
- ERAB Evolved Radio Access Bearer
- Resource reconfiguration including reconfiguration of SRB1 and radio resource configuration, establishment of SRB2, DRB (Data Radio Bearer, data radio bearer) (including default bearer), etc.
- the UE sends an RRC Connection Reconfiguration Complete message to the eNB, indicating that the resource configuration is complete.
- the eNB sends an Initial Context Setup Response message to the MME, indicating that the UE context establishment is completed.
- the UE sends an uplink information transmission (Uplink Information Transfer) message to the eNB, including the NAS layer Attach Complete and the Activate Default EPS Bearer Context Accept message.
- Uplink Information Transfer Uplink Information Transfer
- the eNB sends an Uplink NAS Transport message to the MME, including the NAS layer Attach Complete and the Activate Default EPS Bearer Context Accept message.
- step 7 in the embodiment of the present invention corresponds to the NAS security activation process, and the improvement steps 8 to 11 of the embodiment of the present invention are executed after the NAS security activation process.
- FIG. 14 is a flowchart of a mobile communication method according to Embodiment 16 of the present invention, in which a NAS security activation process (corresponding to step 7 in FIG. 14) is performed according to an existing method, and in the attach process, after the NAS security is activated,
- the MME requests the UE to re-upload the UE capability information or the content in the attachment request by using the newly defined UE Information Request message. (Attach request contents), the UE uploads UE capabilities or Attach request contents through a UE Information Response message, so that the MME acquires the correct UE capability.
- the execution process of this embodiment includes:
- the UE in the RRC_IDLE (Radio Resource Control IDLE) state performs the attach procedure, firstly initiates a random access procedure, that is, sends a first random access message MSG1;
- the eNB After detecting the MSG1 message, the eNB sends a random access response message, that is, an MSG2 message, to the UE.
- the UE After receiving the random access response, the UE adjusts the uplink sending opportunity according to the TA (Timing Advance) of the MSG2, and sends an RRC Connection Request message to the eNB.
- TA Timing Advance
- the eNB sends an RRC Connection Setup message to the UE, including establishing an SRB1 (signaling radio bearer1) and radio resource configuration information.
- SRB1 signaling radio bearer1
- the UE After the completion of the SRB1 bearer and the radio resource configuration, the UE sends an RRC Connection Setup Complete message to the eNB, where the RRC update complete message includes an attach request message of the NAS layer.
- the eNB selects the MME, and sends an initial UE message to the MME, where the initial UE message includes an attach request (Attach Request) message of the NAS layer;
- the UE and the MME perform an AKA and NAS security activation process
- the MME sends a UE Information Request (UE InformationRequest) message to the eNB.
- UE InformationRequest UE InformationRequest
- the eNB sends a UE Information Request (UE InformationRequest) message to the UE.
- UE InformationRequest UE InformationRequest
- the UE sends a UE Information Response (UE InformationResponse) message to the eNB, where the UE information response message carries the UE capability or the Attach request contents;
- UE Information Response UE InformationResponse
- the eNB sends a UE Information Response (UE InformationResponse) message to the MME, where the UE information response message carries the UE capability or the Attach request contents;
- UE InformationResponse UE Information Response
- the MME sends an Initial Context Setup Request to the eNB.
- the message requesting to establish a default bearer wherein the initial context setup request message includes a NAS layer attach request (Attach Accept) and an Activate Default EPS Bearer Context Request message, where the EPS full spell is Evolved Packet Core, Chinese name is the evolved packet core network;
- the eNB After the eNB receives the initial context setup request message, if the initial context setup request message does not include the UE capability information, the eNB sends a UE Capability Enquiry message to the UE to query the UE capability.
- the UE sends a UE Capability Information message to the eNB, and reports UE capability information.
- the eNB sends a UE Capability Information Indication message to the MME, and updates the UE capability information of the MME.
- the eNB sends a security mode command (Security Mode Command) message to the UE according to the security information supported by the UE in the initial context setting request (Initial Context Setup Request) message, and performs security activation;
- a security mode command Security Mode Command
- Initial context setting request Initial Context Setup Request
- the UE sends a Security Mode Complete message to the eNB, indicating that the security activation is completed.
- the eNB sends an RRC Connection Reconfiguration (RRC Connection Reconfiguration) message to the UE according to the ERAB (Evolved Radio Access Bearer) setup information in the Initial Context Setup Request message.
- RRC Connection Reconfiguration RRC Connection Reconfiguration
- ERAB Evolved Radio Access Bearer
- Resource reconfiguration including reconfiguration of SRB1 and radio resource configuration, establishment of SRB2, DRB (Data Radio Bearer, data radio bearer) (including default bearer), etc.
- the UE sends an RRC Connection Reconfiguration Complete message to the eNB, indicating that the resource configuration is complete.
- the eNB sends an Initial Context Setup Response message to the MME, indicating that the UE context establishment is completed.
- the UE sends an uplink information transmission (Uplink Information Transfer) message to the eNB, including the NAS layer Attach Complete and the Activate Default EPS Bearer Context Accept message.
- Uplink Information Transfer Uplink Information Transfer
- the eNB sends an uplink NAS transport (Uplink NAS Transport) message to the MME, including the NAS layer attach complete (Attach Complete), and activates the default evolved packet core network bearer.
- Uplink NAS Transport Uplink NAS Transport
- Attach Complete the NAS layer attach complete
- Attach Complete the default evolved packet core network bearer.
- the following (Activate Default EPS Bearer Context Accept) message is accepted.
- step 7 in the embodiment of the present invention corresponds to the NAS activation process, and the improvement steps 8 to 11 of the embodiment of the present invention are performed after the NAS activation process.
- FIG. 15 is a schematic structural diagram of a mobile communication device according to an embodiment of the present invention.
- the device is deployed in a UE, and includes: a receiving module 1201, a verification module 1202, and a first sending module 1203, where:
- the receiving module 1201 is configured to receive a non-access stratum NAS security mode command message from the mobility management entity MME, where the NAS security mode command message carries first verification matching information for verifying the UE capability information that the MME has received;
- the verification module 1202 is configured to determine, according to the first verification matching information, whether the UE capability information that the MME has received is consistent with the UE capability information that is sent by the UE to the MME.
- the first sending module 1203 is configured to send a NAS security mode complete message to the MME when the UE capability information that the MME has received is consistent with the UE capability information sent by the UE to the MME.
- the first verification matching information is a first hash value of an attach request message that the MME has received before sending the NAS security mode command message to the UE, and the NAS security mode command message further includes an attach that the MME has received.
- the verification module 1202 is specifically configured to:
- the first sending module 1203 is configured to send a NAS security mode complete message to the MME when the second hash value is consistent with the first hash value and the second NAS-MAC is consistent with the first NAS-MAC.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the verification module 1202 is further configured to:
- the first sending module 1203 is specifically configured to:
- the second hash value is consistent with the first hash value
- the second NAS-MAC is consistent with the first NAS-MAC
- the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME
- the NAS is sent to the MME. Safe mode completion message.
- the first sending module 1203 is further configured to:
- the method is further configured to: if the second NAS-MAC is consistent with the first NAS-MAC, and the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME, and the second hash value is inconsistent with the first hash value, Sending a NAS security mode complete message to the MME, where the NAS security mode complete message carries an attach request message.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes the MME adopting the hash calculation of the UE capability information that has been received.
- the verification module 1202 is specifically configured to:
- the fourth hash value of the UE capability information sent by the UE to the MME is calculated according to the hash algorithm
- the first sending module 1203 is specifically configured to: if the packets are consistent, the UE sends a NAS security mode complete message to the MME.
- the NAS security mode command message further includes: a UE security capability returned by the MME;
- the verification module 1202 is further configured to:
- the first sending module 1203 is specifically configured to:
- the fourth hash value is consistent with the third hash value
- the fourth NAS-MAC is consistent with the third NAS-MAC
- the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME
- the NAS is sent to the MME. Safe mode completion message.
- the first sending module 1203 is further configured to:
- the UE sends a NAS security mode failure message to the MME;
- the first sending module 1203 is further configured to: if the fourth NAS-MAC is consistent with the third NAS-MAC, the UE security capability returned by the MME is consistent with the security capability of the UE sent by the UE to the MME, and the fourth hash value and the third hash are If the hash value is inconsistent, the UE sends a NAS security mode complete message to the MME, and the NAS security mode complete message carries the UE capability information.
- the first verification matching information is the UE capability information that the MME has received
- the NAS security mode command message further includes the integrity algorithm, the secret key identifier, and the fifth NAS of the NAS security mode command message adopted by the MME.
- the verification module 1202 is specifically configured to:
- the UE determines whether the sixth NAS-MAC is consistent with the fifth NAS-MAC
- the first sending module 1203 is specifically configured to send a NAS security mode complete message to the MME if they are consistent.
- the verification module 1202 is specifically configured to:
- the UE determines whether the capabilities of the UE capability information received by the MME are identical to those of the UE that are sent to the MME.
- the first sending module 1203 is specifically configured to send a NAS security mode complete message to the MME if they are consistent.
- the first sending module 1203 is further configured to:
- the MME has received the UE capability information other than the UE security capability and the UE sends the MME to the MME, the NAS security mode complete message is sent to the MME, and the NAS security mode complete message carries the UE capability information.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS-MAC of the NAS security mode command message;
- the verification module 1202 is specifically configured to:
- the first sending module 1203 is configured to send a NAS security mode complete message to the MME if the data is consistent, and the NAS security mode complete message carries the second authentication match information and the NAS-MAC of the NAS security mode complete message.
- the second verification matching information includes:
- the hash value of the attach request message that the UE has sent to the MME or
- the hash value of the UE capability information that the UE has sent to the MME is the hash value of the UE capability information that the UE has sent to the MME.
- the second verification matching information includes: UE capability information of the UE.
- the receiving module 1201 is further configured to: after the first sending module 1203 sends the NAS security mode complete message to the MME, receive the downlink NAS transport message sent by the MME, where the downlink NAS transport message carries the UE capability information request message or the request. The UE resends the request message of the attach request message;
- the first sending module 1203 is further configured to send an uplink information transmission message to the MME, where the uplink information transmission message carries the UE capability information or the attach request message.
- the receiving module 1201 is further configured to:
- the first sending module 1203 After transmitting the NAS security mode complete message to the MME, the first sending module 1203 receives the UE information request message sent by the MME, where the UE information request message carries the UE capability information request message or the request message requesting the UE to resend the attach request message;
- the first sending module 1203 is further configured to send a UE information response message to the MME, where the UE information response message carries the UE capability information or the attach request message.
- FIG. 16 is a schematic structural diagram of a mobile communication apparatus according to Embodiment 2 of the present invention, where the apparatus is deployed in In the MME, including:
- the second sending module 1301 is configured to send a NAS security mode command message to the UE, where the NAS security mode command message carries the first verification matching information, where the UE determines, according to the first verification matching information, whether the UE capability information that the MME has received is The UE capability information sent by the UE to the MME is consistent; if they are consistent, the UE sends a NAS security mode complete message to the MME.
- the first verification matching information is a first hash value of the attach request message that the MME has received
- the NAS security mode command message further includes the MME adopting the hash calculation for the already received attachment request message.
- the NAS security mode command message further includes: the UE security capability that the MME has received.
- the device further includes: a first receiving module 1302, configured to:
- the second NAS-MAC of the NAS security mode command generated by the UE is consistent with the first NAS-MAC, and the UE security capability of the MME backhaul is the same as the security capability of the UE sent by the UE to the MME and the second request of the UE to generate the attach request message.
- the NAS security mode complete message sent by the UE is received, where the NAS security mode complete message carries the attach request message.
- the first verification matching information is a third hash value of the UE capability information that the MME has received
- the NAS security mode command message further includes the MME adopting the hash calculation of the UE capability information that has been received.
- the hash algorithm, the integrity algorithm used by the MME, the secret key identifier, and the third NAS-MAC of the NAS security mode command message is a third hash value of the UE capability information that the MME has received.
- the NAS security mode command message further includes: the UE security capability that the MME has received.
- the device further includes: a second receiving module 1303, configured to:
- the fourth NAS-MAC of the NAS security mode command message generated by the UE is consistent with the third NAS-MAC, and the UE security capability returned by the MME is the same as the UE security capability sent by the UE to the MME, and the UE capability information generated by the UE is the fourth.
- the NAS security mode completion message sent by the UE is received, and the NAS security mode completion message carries the UE capability information.
- the first verification matching information is UE capability information that the MME has received
- the NAS security mode command message further includes an integrity algorithm, a secret key identifier, and an MME.
- the fifth NAS-MAC of the NAS security mode command message is UE capability information that the MME has received
- the device further includes: a third receiving module 1304, configured to:
- the sixth NAS-MAC of the NAS security mode command message generated by the UE is consistent with the fifth NAS-MAC, and the UE security capability included in the UE capability information that the MME has received is consistent with the security capability of the UE sent by the UE to the MME.
- the UE determines that the UE capability information received by the MME is not the same as the UE security capability, and the UE security mode completion message is sent by the UE.
- the NAS security mode completion message carries the UE capability information.
- the NAS security mode command message includes: a UE security capability received by the MME, an integrity algorithm used by the MME, a secret key identifier, and a seventh NAS-MAC of the NAS security mode command message.
- the apparatus further includes: a fourth receiving module 1305, configured to receive a NAS security mode completion message sent by the UE, and the NAS security mode completion message carries the second verification matching information and the NAS of the NAS security mode completion message.
- a fourth receiving module 1305, configured to receive a NAS security mode completion message sent by the UE, and the NAS security mode completion message carries the second verification matching information and the NAS of the NAS security mode completion message.
- the second verification matching information includes:
- the hash value of the attach request message that the UE has sent to the MME or
- the hash value of the UE capability information that the UE has sent to the MME is the hash value of the UE capability information that the UE has sent to the MME.
- the second verification matching information includes: UE capability information of the UE.
- the second sending module 1301 is further configured to: if the UE capability information that the MME has received is inconsistent with that sent by the UE, send a downlink NAS transmission message to the UE, where the downlink NAS transmission message carries the UE capability information request message. Or requesting the UE to resend the request message of the attach request message;
- the fourth receiving module 1305 is further configured to receive an uplink information transmission message sent by the UE, where the uplink information transmission message carries the UE capability information or the attach request message.
- the second sending module 1301 is further configured to: if the MME determines that the UE capability information that the MME has received is inconsistent with that sent by the UE, send a UE information request message to the UE, where the UE information request message carries the UE capability information request. a message or a request message requesting the UE to resend the attach request message;
- the fourth receiving module 1305 is further configured to receive a UE information response message sent by the UE, where the UE information response message carries the UE capability information or the attach request message.
- FIG. 17 is a schematic structural diagram of a mobile communication device according to an embodiment of the present invention.
- the mobile communication device 1400 includes a communication interface 1401, a memory 1403, and a processor 1402.
- the communication interface 1401, the processor 1402, the memory 1403, and the bus 1404 communicate with each other through the bus 1404.
- the bus 1404 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 14, but it does not mean that there is only one bus or one type of bus.
- the communication interface 1401 is configured to communicate with a transmitting end.
- the memory 1403 is configured to store a program.
- the program can include program code, the program code including computer operating instructions.
- the memory 1403 may include a random access memory (RAM), and may also include a non-volatile memory such as at least one disk storage.
- the processor 1402 executes the program stored in the memory 1403 to implement the method of the foregoing method embodiment of the present invention:
- NAS security mode command message carries first verification matching information for verifying UE capability information that the MME has received;
- the UE sends a NAS security mode complete message to the MME.
- the processor 1402 may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP Processor, etc.), or a digital signal processor (DSP), an application specific integrated circuit. (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component.
- CPU central processing unit
- NP Processor network processor
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA Field Programmable Gate Array
- FIG. 18 is a schematic structural diagram of a mobile communication device according to Embodiment 2 of the present invention.
- the mobile communication device 1500 includes a communication interface 1501, a memory 1503, and a processor 1502.
- the communication interface 1501, the processor 1502, the memory 1503, and the bus 1504 communicate with each other.
- the bus 1504 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus. Place
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- Place The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 15, but it does not mean that there is only one bus or one type of bus.
- the communication interface 1501 is configured to communicate with a transmitting end.
- the memory 1503 is configured to store a program.
- the program can include program code, the program code including computer operating instructions.
- the memory 1503 may include a random access memory (RAM), and may also include a non-volatile memory such as at least one disk storage.
- the processor 1502 executes the program stored in the memory 1503 to implement the method of the foregoing method embodiment of the present invention:
- NAS security mode command message carries the first verification matching information
- the UE determines, according to the first verification matching information, that the MME has received Whether the UE capability information is consistent with the UE capability information sent by the UE to the MME; if they are consistent, the UE sends a NAS security mode complete message to the MME.
- the processor 1502 may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP Processor, etc.), or a digital signal processor (DSP), an application specific integrated circuit. (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component.
- CPU central processing unit
- NP Processor network processor
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA Field Programmable Gate Array
- the UE verifies, according to the received first verification matching message, whether the UE capability information that the MME has received is consistent with the capability information of the UE that is sent by the UE to the MME, and may be returned by the MME in the embodiment of the present invention.
- Verifying the matching message the UE verifies the UE capability information received by the MME, and ensures that the MME has the correct UE capability information, and the Attach Request message in the Attach process is not protected by the NAS security context.
- the attacker may To modify the UE capability information, the MME cannot obtain the correct UE capability and the DoS attack problem.
- the DoS is the abbreviation of the Denial of Service, that is, the denial of service, and the DoS attack behavior is called a DoS attack.
- the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
- the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (62)
- 一种移动通信方法,其特征在于,包括:用户设备UE接收来自移动管理实体MME的非接入层NAS安全模式命令消息,所述NAS安全模式命令消息中携带用于对所述MME已经接收到的UE能力信息进行验证的第一验证匹配信息;所述UE根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求1所述的方法,其特征在于,所述第一验证匹配信息为所述MME向所述UE发送所述NAS安全模式命令消息前已经接收到的附着请求消息的第一哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的所述附着请求消息进行哈希计算所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第一非接入层消息认证码NAS-MAC;所述UE计算所述UE接收到的所述NAS安全模式命令消息的第二NAS-MAC;所述UE确定第二NAS-MAC是否与所述第一NAS-MAC一致;若一致,所述UE根据哈希算法,计算所述UE发送给所述MME的附着请求消息的第二哈希值;所述UE确定所述二哈希值是否与所述第一哈希值一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求2所述的方法,其特征在于,所述NAS安全模式命令消息还包括:所述MME回传的UE安全能力;所述UE确定所述MME回传的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;相应的,所述若一致,则所述UE向所述MME发送NAS安全模式完成消息,包括:若所述第二哈希值与所述第一哈希值一致、所述第二NAS-MAC与所述第一NAS-MAC一致且所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致,则所述UE向所述MME发送NAS安全模式完成 消息。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:若所述第二哈希值、所述第二NAS-MAC以及所述MME回传的UE安全能力中的至少一项验证失败,则所述UE向所述MME发送NAS安全模式失败消息;或者,若所述第二NAS-MAC与所述第一NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述第二哈希值与所述第一哈希值不一致,则所述UE向所述MME发送NAS安全模式完成消息,该NAS安全模式完成消息中携带附着请求消息。
- 根据权利要求1所述的方法,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息的第三哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的UE能力信息进行哈希计算所所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第三NAS-MAC;所述UE计算所述UE接收到的所述NAS安全模式命令消息的第四NAS-MAC;所述UE确定所述第四NAS-MAC是否与所述第三NAS-MAC一致;若一致,所述UE根据哈希算法,计算所述UE发送给所述MME的UE能力信息的第四哈希值;所述UE确定所述二哈希值是否与所述第三哈希值一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求5所述的方法,其特征在于,所述NAS安全模式命令消息中还包括:所述MME回传的UE安全能力;所述UE确定所述MME回传的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;相应的,所述若一致,则所述UE向所述MME发送NAS安全模式完成消息,包括:若所述第四哈希值与所述第三哈希值一致、所述第四NAS-MAC与所述第三NAS-MAC一致且所述MME回传的UE安全能力与所述UE发送给所述 MME的UE安全能力一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求6所述的方法,其特征在于,所述方法还包括:若所述第四哈希值、所述第四NAS-MAC以及所述MME回传的UE安全能力中的至少一项验证失败,则所述UE向所述MME发送NAS安全模式失败消息;或者,若所述第四NAS-MAC与所述第三NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述第四哈希值与所述第三哈希值不一致,则所述UE向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求1所述的方法,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息,所述NAS安全模式命令消息还包括所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第五NAS-MAC;所述UE计算所述UE接收到的所述NAS安全模式命令消息的第六NAS-MAC;所述UE确定所述第六NAS-MAC是否与所述第五NAS-MAC一致;若一致,所述UE所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求8所述的方法,其特征在于,所述UE确定所述第六NAS-MAC是否与所述第五NAS-MAC一致,若一致,所述UE确定所述MME已经接收到的所述UE能力信息中所包括的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;若一致,则所述UE确定所述MME接收到的所述UE能力信息中除所述UE安全能力外的其它能力是否分别与所述UE发送给所述MME的一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:若所述MME已经接收到的所述UE能力信息中除所述UE安全能力外的 其它能力与所述UE发送给所述MME的不一致,则所述UE向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求1所述的方法,其特征在于,所述NAS安全模式命令消息包括:所述MME接收到的UE安全能力、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第七NAS-MAC;所述UE计算所述UE接收到的所述NAS安全模式命令消息的第八NAS-MAC;所述UE确定所述第八NAS-MAC是否与所述第七NAS-MAC一致;若一致,所述UE确定所述MME接收到的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带第二验证匹配信息以及所述NAS安全模式完成消息的NAS-MAC。
- 根据权利要求11所述的方法,其特征在于,所述第二验证匹配信息包括:所述UE已经向所述MME发送的附着请求消息的哈希值;或者,所述UE已经向所述MME发送的UE能力信息的哈希值。
- 根据权利要求11所述的方法,其特征在于,所述第二验证匹配信息包括:所述UE的UE能力信息。
- 根据权利要求11或12所述的方法,其特征在于,所述UE向所述MME发送NAS安全模式完成消息之后,还包括:所述UE接收所述MME发送的下行NAS传输消息,所述下行NAS传输消息中携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述UE向所述MME发送上行信息传输消息,所述上行信息传输消息中携带所述UE能力信息或附着请求消息。
- 根据权利要求11或12所述的方法,其特征在于,所述UE向所述MME发送NAS安全模式完成消息之后,还包括:所述UE接收所述MME发送的UE信息请求消息,所述UE信息请求消 息携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述UE向所述MME发送UE信息应答消息,所述UE信息应答消息中携带UE能力信息或附着请求消息。
- 一种移动通信方法,其特征在于,包括:MME向UE发送NAS安全模式命令消息,所述NAS安全模式命令消息中携带第一验证匹配信息,用于所述UE根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求16所述的方法,其特征在于,所述第一验证匹配信息为所述MME已经接收到的附着请求消息的第一哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的所述附着请求消息进行哈希计算所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第一非接入层消息认证NAS-MAC。
- 根据权利要求17所述的方法,其特征在于,所述NAS安全模式命令消息还包括:所述MME已经接收到的UE安全能力。
- 根据权利要求18所述的方法,其特征在于,所述方法还包括:在所述UE生成的所述NAS安全模式命令消息的第二NAS-MAC与所述第一NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述UE生成的附着请求消息的第二哈希值与所述第一哈希值不一致时,所述MME接收所述UE发送的NAS安全模式完成消息,其中所述NAS安全模式完成消息中携带附着请求消息。
- 根据权利要求16所述的方法,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息的第三哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的UE能力信息进行哈希计算所所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第三NAS-MAC。
- 根据权利要求20所述的方法,其特征在于,所述NAS安全模式命令消息中还包括:所述MME已经接收到的UE安全能力。
- 根据权利要求21所述的方法,其特征在于,所述方法还包括:在所述UE生成的所述NAS安全模式命令消息的第四NAS-MAC与所述第三NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述UE生成的UE能力信息的第四哈希值与所述第三哈希值不一致时,所述MME接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求16所述的方法,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息,所述NAS安全模式命令消息还包括所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第五NAS-MAC。
- 根据权利要求23所述的方法,其特征在于,所述方法还包括:在所述UE生成的所述NAS安全模式命令消息的第六NAS-MAC与所述第五NAS-MAC一致、所述MME回传的所述UE能力信息中所包括的UE安全能力与所述UE发送给所述MME的UE安全能力一致且在所述UE确定所述MME已经接收到的所述UE能力信息中除所述UE安全能力外的其它能力与所述UE发送给所述MME的不一致时,所述MME接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求16所述的方法,其特征在于,所述所述NAS安全模式命令消息包括:所述MME接收到的UE安全能力、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第七NAS-MAC。
- 根据权利要求25所述的方法,其特征在于,所述方法还包括:所述MME接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带第二验证匹配信息以及所述NAS安全模式完成消息的NAS-MAC;
- 根据权利要求26所述的方法,其特征在于,所述第二验证匹配信息包括:所述UE已经向所述MME发送的附着请求消息的哈希值;或者,所述UE已经向所述MME发送的UE能力信息的哈希值。
- 根据权利要求26所述的方法,其特征在于,所述第二验证匹配信息包括:所述UE的UE能力信息。
- 根据权利要求26或27所述的方法,其特征在于,所述方法还包括:若所述MME确定所述MME已经接收到的所述UE能力信息与所述UE发送的不一致,则所述MME向所述UE发送下行NAS传输消息,所述下行NAS传输消息中携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述MME接收所述UE发送的上行信息传输消息,所述上行信息传输消息中携带所述UE能力信息或附着请求消息。
- 根据权利要求26或27所述的方法,其特征在于,所述方法还包括:若所述MME确定所述MME已经接收到的所述UE能力信息与所述UE发送的不一致,则所述MME向所述UE发送UE信息请求消息,所述UE信息请求消息携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述MME接收所述UE发送的UE信息应答消息,所述UE信息应答消息中携带UE能力信息或附着请求消息。
- 一种移动通信装置,其特征在于,所述装置部署于UE中,包括:接收模块,用于接收来自移动管理实体MME的非接入层NAS安全模式命令消息,所述NAS安全模式命令消息中携带用于对所述MME已经接收到的UE能力信息进行验证的第一验证匹配信息;验证模块,用于根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;第一发送模块,用于MME已经接收到的UE能力信息与所述UE发送给所述MME的UE能力信息一致时,向所述MME发送NAS安全模式完成消息。
- 根据权利要求31所述的装置,其特征在于,所述第一验证匹配信息为所述MME向所述UE发送所述NAS安全模式命令消息前已经接收到的附着请求消息的第一哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的所述附着请求消息进行哈希计算所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第一非接入层消息认证码NAS-MAC;所述验证模块,具体用于:计算所述UE接收到的所述NAS安全模式命令消息的第二NAS-MAC;确定第二NAS-MAC是否与所述第一NAS-MAC一致;若一致,根据哈希算法,计算所述UE发送给所述MME的附着请求消息的第二哈希值;确定所述二哈希值是否与所述第一哈希值一致;所述第一发送模块,具体用于所述二哈希值与所述第一哈希值一致且所述第二NAS-MAC与所述第一NAS-MAC一致时,向所述MME发送NAS安全模式完成消息。
- 根据权利要求32所述的装置,其特征在于,所述NAS安全模式命令消息中还包括:所述MME回传的UE安全能力;所述验证模块,还用于:确定所述MME回传的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;所述第一发送模块,具体用于:若所述第二哈希值与所述第一哈希值一致、所述第二NAS-MAC与所述第一NAS-MAC一致且所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致,则向所述MME发送NAS安全模式完成消息。
- 根据权利要求33所述的装置,其特征在于,所述第一发送模块,还用于:若所述第二哈希值、所述第二NAS-MAC以及所述MME回传的UE安全能力中的至少一项验证失败,则向所述MME发送NAS安全模式失败消息;或者,还用于:若所述第二NAS-MAC与所述第一NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述第二哈希值与所述第一哈希值不一致,则向所述MME发送NAS安全模式完成消息,该NAS安全模式完成消息中携带附着请求消息。
- 根据权利要求31所述的装置,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息的第三哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的UE能力信息进行哈希计算所所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS 安全模式命令消息的第三NAS-MAC;所述验证模块,具体用于:计算所述UE接收到的所述NAS安全模式命令消息的第四NAS-MAC;确定所述第四NAS-MAC是否与所述第三NAS-MAC一致;若一致,根据哈希算法,计算所述UE发送给所述MME的UE能力信息的第四哈希值;确定所述二哈希值是否与所述第三哈希值一致;所述第一发送模块,具体用于若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求35所述的装置,其特征在于,所述NAS安全模式命令消息中还包括:所述MME回传的UE安全能力;所述验证模块,还用于:确定所述MME回传的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;所述第一发送模块,具体用于:若所述第四哈希值与所述第三哈希值一致、所述第四NAS-MAC与所述第三NAS-MAC一致且所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致,则向所述MME发送NAS安全模式完成消息。
- 根据权利要求36所述的装置,其特征在于,所述第一发送模块,还用于:若所述第四哈希值、所述第四NAS-MAC以及所述MME回传的UE安全能力中的至少一项验证失败,则所述UE向所述MME发送NAS安全模式失败消息;或者,所述第一发送模块,还用于若所述第四NAS-MAC与所述第三NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述第四哈希值与所述第三哈希值不一致,则所述UE向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求31所述的装置,其特征在于,所述第一验证匹配信息 为所述MME已经接收到的UE能力信息,所述NAS安全模式命令消息还包括所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第五NAS-MAC;所述验证模块,具体用于:计算所述UE接收到的所述NAS安全模式命令消息的第六NAS-MAC;所述UE确定所述第六NAS-MAC是否与所述第五NAS-MAC一致;确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;所述第一发送模块,具体用于若一致,则向所述MME发送NAS安全模式完成消息。
- 根据权利要求38所述的装置,其特征在于,所述验证模块,具体用于:确定所述第六NAS-MAC是否与所述第五NAS-MAC一致;若一致,确定所述MME已经接收到的所述UE能力信息中所包括的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;若一致,则所述UE确定所述MME接收到的所述UE能力信息中除所述UE安全能力外的其它能力是否分别与所述UE发送给所述MME的一致;所述第一发送模块,具体用于若一致,则向所述MME发送NAS安全模式完成消息。
- 根据权利要求39所述的装置,其特征在于,所述第一发送模块还用于:若所述MME已经接收到的所述UE能力信息中除所述UE安全能力外的其它能力与所述UE发送给所述MME的不一致,则向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求31所述的装置,其特征在于,所述NAS安全模式命令消息包括:所述MME接收到的UE安全能力、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第七NAS-MAC;所述验证模块,具体用于:计算所述UE接收到的所述NAS安全模式命令消息的第八NAS-MAC;确定所述第八NAS-MAC是否与所述第七NAS-MAC一致,若一致,确 定所述MME接收到的UE安全能力是否与所述UE发送给所述MME的UE安全能力一致;所述第一发送模块,具体用于若一致,则向所述MME发送NAS安全模式完成消息,所述NAS安全模式完成消息中携带第二验证匹配信息以及所述NAS安全模式完成消息的NAS-MAC。
- 根据权利要求41所述的装置,其特征在于,所述第二验证匹配信息包括:所述UE已经向所述MME发送的附着请求消息的哈希值;或者,所述UE已经向所述MME发送的UE能力信息的哈希值。
- 根据权利要求41所述的装置,其特征在于,所述第二验证匹配信息包括:所述UE的UE能力信息。
- 根据权利要求41或42所述的装置,其特征在于,所述接收模块,还用于所述第一发送模块向所述MME发送NAS安全模式完成消息之后,接收所述MME发送的下行NAS传输消息,所述下行NAS传输消息中携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述第一发送模块,还用于向所述MME发送上行信息传输消息,所述上行信息传输消息中携带所述UE能力信息或附着请求消息。
- 根据权利要求41或42所述的装置,其特征在于,所述接收模块还用于:所述第一发送模块向所述MME发送NAS安全模式完成消息之后,接收所述MME发送的UE信息请求消息,所述UE信息请求消息携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述第一发送模块,还用于向所述MME发送UE信息应答消息,所述UE信息应答消息中携带UE能力信息或附着请求消息。
- 一种移动通信装置,其特征在于,所述装置部署于MME中,包括:第二发送模块,用于向UE发送NAS安全模式命令消息,所述NAS安全模式命令消息中携带所述第一验证匹配信息,用于所述UE根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
- 根据权利要求46所述的装置,其特征在于,所述第一验证匹配信息为所述MME已经接收到的附着请求消息的第一哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的所述附着请求消息进行哈希计算所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第一非接入层消息认证NAS-MAC。
- 根据权利要求47所述的装置,其特征在于,所述NAS安全模式命令消息中还包括:所述MME已经接收到的UE安全能力。
- 根据权利要求48所述的装置,其特征在于,所述装置还包括:第一接收模块,用于:在所述UE生成的所述NAS安全模式命令的第二NAS-MAC与所述第一NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述UE生成的附着请求消息的第二哈希值与所述第一哈希值不一致时,接收所述UE发送的NAS安全模式完成消息,其中所述NAS安全模式完成消息中携带附着请求消息。
- 根据权利要求46所述的装置,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息的第三哈希值,所述NAS安全模式命令消息还包括所述MME对已经接收到的UE能力信息进行哈希计算所所采用的哈希算法、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第三NAS-MAC。
- 根据权利要求50所述的装置,其特征在于,所述NAS安全模式命令消息中还包括:所述MME已经接收到的UE安全能力。
- 根据权利要求51所述的装置,其特征在于,所述装置还包括:第二接收模块,用于:在所述UE生成的所述NAS安全模式命令消息的第四NAS-MAC与所述第三NAS-MAC一致、所述MME回传的UE安全能力与所述UE发送给所述MME的UE安全能力一致且所述UE生成的UE能力信息的第四哈希值与所述第三哈希值不一致时,接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求46所述的装置,其特征在于,所述第一验证匹配信息为所述MME已经接收到的UE能力信息,所述NAS安全模式命令消息还包 括所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第五NAS-MAC。
- 根据权利要求53所述的装置,其特征在于,所述装置还包括:第三接收模块,用于:在所述UE生成的所述NAS安全模式命令消息的第六NAS-MAC与所述第五NAS-MAC一致、所述MME已经接收到的所述UE能力信息中所包括的UE安全能力与所述UE发送给所述MME的UE安全能力一致且在所述UE确定所述MME已经接收到的所述UE能力信息中除所述UE安全能力外的其它能力与所述UE发送给所述MME的不一致时,接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带UE能力信息。
- 根据权利要求46所述的装置,其特征在于,所述所述NAS安全模式命令消息包括:所述MME接收到的UE安全能力、所述MME所采用的完整性算法、秘钥标识以及所述NAS安全模式命令消息的第七NAS-MAC。
- 根据权利要求55所述的装置,其特征在于,所述装置还包括:第四接收模块,用于接收所述UE发送的NAS安全模式完成消息,所述NAS安全模式完成消息中携带第二验证匹配信息以及所述NAS安全模式完成消息的NAS-MAC;
- 根据权利要求56所述的装置,其特征在于,所述第二验证匹配信息包括:所述UE已经向所述MME发送的附着请求消息的哈希值;或者,所述UE已经向所述MME发送的UE能力信息的哈希值。
- 根据权利要求56所述的装置,其特征在于,所述第二验证匹配信息包括:所述UE的UE能力信息。
- 根据权利要求56或57所述的装置,其特征在于,所述第二发送模块,还用于若所述MME已经接收到的所述UE能力信息与所述UE发送的不一致,则向所述UE发送下行NAS传输消息,所述下行NAS传输消息中携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述第四接收模块,还用于接收所述UE发送的上行信息传输消息,所述上行信息传输消息中携带所述UE能力信息或附着请求消息。
- 根据权利要求56或57所述的装置,其特征在于,所述第二发送模块还用于:若所述MME确定所述MME已经接收到的所述UE能力信息与所述UE发送的不一致,则向所述UE发送UE信息请求消息,所述UE信息请求消息携带UE能力信息请求消息或者请求所述UE重新发送附着请求消息的请求消息;所述第四接收模块,还用于接收所述UE发送的UE信息应答消息,所述UE信息应答消息中携带UE能力信息或附着请求消息。
- 一种移动通信设备,其特征在于,所述设备部署于UE中,包括:通信接口、存储器、处理器和通信总线,其中,所述通信接口、所述存储器和所述处理器通过所述通信总线通信;所述存储器用于存放程序,所述处理器用于执行所述存储器存储的程序;当所述移动通信设备运行时,所述处理器运行程序,所述程序包括:接收来自移动管理实体MME的非接入层NAS安全模式命令消息,所述NAS安全模式命令消息中携带用于对所述MME已经接收到的UE能力信息进行验证的第一验证匹配信息;根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则向所述MME发送NAS安全模式完成消息。
- 一种移动通信设备,其特征在于,所述设备部署于MME中,包括:通信接口、存储器、处理器和通信总线,其中,所述通信接口、所述存储器和所述处理器通过所述通信总线通信;所述存储器用于存放程序,所述处理器用于执行所述存储器存储的程序;当所述移动通信设备运行时,所述处理器运行程序,所述程序包括:向UE发送NAS安全模式命令消息,所述NAS安全模式命令消息中携带第一验证匹配信息,用于所述UE根据所述第一验证匹配信息,确定所述MME已经接收到的UE能力信息是否与所述UE发送给所述MME的UE能力信息一致;若一致,则所述UE向所述MME发送NAS安全模式完成消息。
Priority Applications (19)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21163083.5A EP3873122A1 (en) | 2016-01-05 | 2016-01-05 | Avoiding a man-in-the-middle attack on an attach request message |
PCT/CN2016/070182 WO2017117721A1 (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
CN202110217166.9A CN113271594A (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
CN202110217266.1A CN113271595B (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
CN201910127640.1A CN109729096B (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
KR1020187022094A KR102125826B1 (ko) | 2016-01-05 | 2016-01-05 | 이동 통신 방법, 장치 및 디바이스 |
RU2018128207A RU2706173C1 (ru) | 2016-01-05 | 2016-01-05 | Способ, аппаратура и устройство мобильной связи |
JP2018553275A JP6598225B2 (ja) | 2016-01-05 | 2016-01-05 | モバイル通信方法、装置、およびデバイス |
BR112018013812-6A BR112018013812B1 (pt) | 2016-01-05 | Método e aparelho de comunicação móvel | |
EP20192538.5A EP3800914B1 (en) | 2016-01-05 | 2016-01-05 | Avoiding a man-in-the-middle attack on an attach request message |
CN201680077927.2A CN108702624B (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
CN202110217137.2A CN113055888B (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
EP16882868.9A EP3393159B1 (en) | 2016-01-05 | 2016-01-05 | Avoiding a man-in-the-middle attack on an attach request message |
US16/026,777 US10419938B2 (en) | 2016-01-05 | 2018-07-03 | Mobile communication method, apparatus, and device |
US16/552,530 US10944786B2 (en) | 2016-01-05 | 2019-08-27 | Mobile communication method, apparatus, and device |
US17/138,498 US11310266B2 (en) | 2016-01-05 | 2020-12-30 | Mobile communication method, apparatus, and device |
US17/723,257 US11736519B2 (en) | 2016-01-05 | 2022-04-18 | Mobile communication method, apparatus, and device |
US18/355,671 US12003533B2 (en) | 2016-01-05 | 2023-07-20 | Mobile communication method, apparatus, and device |
US18/668,898 US20240396934A1 (en) | 2016-01-05 | 2024-05-20 | Mobile communication method, apparatus, and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/070182 WO2017117721A1 (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/026,777 Continuation US10419938B2 (en) | 2016-01-05 | 2018-07-03 | Mobile communication method, apparatus, and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017117721A1 true WO2017117721A1 (zh) | 2017-07-13 |
Family
ID=59273185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/070182 WO2017117721A1 (zh) | 2016-01-05 | 2016-01-05 | 移动通信方法、装置及设备 |
Country Status (7)
Country | Link |
---|---|
US (6) | US10419938B2 (zh) |
EP (3) | EP3873122A1 (zh) |
JP (1) | JP6598225B2 (zh) |
KR (1) | KR102125826B1 (zh) |
CN (5) | CN113271595B (zh) |
RU (1) | RU2706173C1 (zh) |
WO (1) | WO2017117721A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210021994A1 (en) * | 2019-10-07 | 2021-01-21 | Intel Corporation | Secure user equipment capability transfer for user equipment with no access stratum security |
WO2021051974A1 (zh) * | 2019-09-16 | 2021-03-25 | 华为技术有限公司 | 一种空口信息的安全保护方法及装置 |
JP2022501857A (ja) * | 2018-08-09 | 2022-01-06 | オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. | 能力報告の方法及びデバイス |
CN114208240A (zh) * | 2020-01-22 | 2022-03-18 | 华为技术有限公司 | 数据传输方法、装置及系统 |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6651613B2 (ja) * | 2015-10-05 | 2020-02-19 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | ワイヤレス通信 |
EP3873122A1 (en) | 2016-01-05 | 2021-09-01 | Huawei Technologies Co., Ltd. | Avoiding a man-in-the-middle attack on an attach request message |
CA3016848C (en) * | 2016-03-28 | 2024-01-09 | Panasonic Intellectual Property Corporation Of America | User equipment, base station and codec mode switching method |
US20180083972A1 (en) * | 2016-09-20 | 2018-03-22 | Lg Electronics Inc. | Method and apparatus for security configuration in wireless communication system |
MX2019008888A (es) * | 2017-01-30 | 2019-10-15 | Telefonaktiebolaget LM Ericsson publi | Comunicaciones inalámbricas. |
CN109756451B (zh) * | 2017-11-03 | 2022-04-22 | 华为技术有限公司 | 一种信息交互方法及装置 |
KR102405412B1 (ko) * | 2018-04-06 | 2022-06-07 | 삼성전자주식회사 | 무선 통신 시스템에서 정보 보안을 위한 장치 및 방법 |
US10798745B2 (en) * | 2018-09-28 | 2020-10-06 | Verizon Patent And Licensing Inc. | Determining device locations based on random access channel signaling |
KR102460418B1 (ko) * | 2018-11-21 | 2022-10-31 | 한국전자통신연구원 | 통신 시스템에서 제어 메시지의 송수신 방법 및 장치 |
WO2020148172A1 (en) * | 2019-01-15 | 2020-07-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Radio access capabilities of a wireless device |
US11470473B2 (en) * | 2019-01-18 | 2022-10-11 | Qualcomm Incorporated | Medium access control security |
CN111866884B (zh) * | 2019-04-26 | 2022-05-24 | 华为技术有限公司 | 一种安全保护方法及装置 |
CN112087747A (zh) * | 2019-06-14 | 2020-12-15 | 苹果公司 | 改善的rrc过程安全性 |
US20210105611A1 (en) * | 2019-10-04 | 2021-04-08 | Qualcomm Incorporated | User equipment radio capability protection |
EP4084516A4 (en) * | 2019-12-27 | 2023-09-20 | Ntt Docomo, Inc. | BASE STATION AND WIRELESS COMMUNICATION METHOD |
CN115087971A (zh) * | 2020-02-14 | 2022-09-20 | 瑞典爱立信有限公司 | 保护无线通信网络中的能力信息传输 |
KR102279293B1 (ko) * | 2020-08-07 | 2021-07-20 | 한국인터넷진흥원 | 비암호화 채널 탐지 방법 및 장치 |
US11522767B2 (en) | 2020-10-22 | 2022-12-06 | Bank Of America Corporation | System for real-time imitation network generation using artificial intelligence |
KR20220135792A (ko) * | 2021-03-31 | 2022-10-07 | 삼성전자주식회사 | 데이터 보호를 위한 nas 메시지 이용 방법 및 장치 |
EP4500798A1 (en) * | 2022-03-24 | 2025-02-05 | Four Drobotics Corporation | System and method for detection of cybersecurity threats |
CN119155677A (zh) * | 2023-06-14 | 2024-12-17 | 华为技术有限公司 | 通信方法和通信装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101378591A (zh) * | 2007-08-31 | 2009-03-04 | 华为技术有限公司 | 终端移动时安全能力协商的方法、系统及装置 |
CN101384079A (zh) * | 2007-09-03 | 2009-03-11 | 华为技术有限公司 | 一种终端移动时防止降质攻击的方法、系统及装置 |
US20100115275A1 (en) * | 2008-11-03 | 2010-05-06 | Samsung Electronics Co. Ltd. | Security system and method for wireless communication system |
CN101835156A (zh) * | 2010-05-21 | 2010-09-15 | 中兴通讯股份有限公司 | 一种用户接入安全保护的方法及系统 |
US20140241317A1 (en) * | 2013-02-22 | 2014-08-28 | Samsung Electronics Co., Ltd. | Method and system for providing simultaneous connectivity between multiple e-nodebs and user equipment |
CN104967984A (zh) * | 2015-04-29 | 2015-10-07 | 大唐移动通信设备有限公司 | 一种获取用户设备的信息的方法和系统 |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101061373B1 (ko) * | 2005-04-11 | 2011-09-02 | 삼성전자주식회사 | 푸쉬투토크 오버 셀룰러 망의 미디어 저장 서비스 수행 방법과 PoC 서버 및 PoC 클라이언트 |
CN101022330A (zh) * | 2006-02-13 | 2007-08-22 | 华为技术有限公司 | 提高密钥管理授权消息安全性的方法和模块 |
CN101011330A (zh) | 2006-12-14 | 2007-08-08 | 成都死海盐疗健康馆服务有限公司 | 矿物盐沐浴露 |
CN101242629B (zh) * | 2007-02-05 | 2012-02-15 | 华为技术有限公司 | 选择用户面算法的方法、系统和设备 |
US9247420B2 (en) * | 2007-12-12 | 2016-01-26 | Lg Electronics Inc. | Method of managing user equipment capabilities |
US8503460B2 (en) * | 2008-03-24 | 2013-08-06 | Qualcomm Incorporated | Dynamic home network assignment |
US8965338B2 (en) * | 2008-06-09 | 2015-02-24 | Apple Inc | Network access control methods and apparatus |
CN101686233B (zh) * | 2008-09-24 | 2013-04-03 | 电信科学技术研究院 | Ue与网络安全算法不匹配的处理方法、系统及装置 |
CN101848464B (zh) * | 2009-03-28 | 2012-11-21 | 华为技术有限公司 | 实现网络安全的方法、装置及系统 |
US8605904B2 (en) * | 2009-08-14 | 2013-12-10 | Industrial Technology Research Institute | Security method in wireless communication system having relay node |
CN102025685B (zh) * | 2009-09-21 | 2013-09-11 | 华为技术有限公司 | 认证处理方法及装置 |
KR101700448B1 (ko) * | 2009-10-27 | 2017-01-26 | 삼성전자주식회사 | 이동 통신 시스템에서 보안 관리 시스템 및 방법 |
KR101683883B1 (ko) * | 2009-12-31 | 2016-12-08 | 삼성전자주식회사 | 이동 통신 시스템에서 보안을 지원하는 방법 및 시스템 |
CN101790168B (zh) * | 2010-02-01 | 2015-05-20 | 中兴通讯股份有限公司 | Nas和as初始安全模式命令过程的方法 |
KR101737425B1 (ko) * | 2010-06-21 | 2017-05-18 | 삼성전자주식회사 | 응급 콜을 지원하는 이동 통신 시스템에서 보안 관리 방법 및 장치와 그 시스템 |
CN102624759B (zh) * | 2011-01-28 | 2017-03-29 | 中兴通讯股份有限公司 | 一种实现会话中数据迁移的方法和节点 |
CN102307091B (zh) * | 2011-10-09 | 2014-10-29 | 大唐移动通信设备有限公司 | Nas层信令的保护方法和设备 |
CN102917332B (zh) * | 2012-10-11 | 2015-06-03 | 大唐移动通信设备有限公司 | 一种实现移动设备附着的方法及装置 |
CN102905265B (zh) * | 2012-10-11 | 2016-02-10 | 大唐移动通信设备有限公司 | 一种实现移动设备附着的方法及装置 |
KR101807487B1 (ko) * | 2013-01-10 | 2017-12-11 | 닛본 덴끼 가부시끼가이샤 | Ue 및 네트워크 양자에서의 키 도출을 위한 mtc 키 관리 |
CN104427584B (zh) * | 2013-08-19 | 2019-08-16 | 南京中兴软件有限责任公司 | 安全上下文处理方法及装置 |
KR101746193B1 (ko) * | 2013-11-13 | 2017-06-20 | 한국전자통신연구원 | 보안 도우미 서비스 제공장치 및 서비스 제공방법 |
EP3122144B8 (en) * | 2014-04-16 | 2019-03-13 | Huawei Device Co., Ltd. | Device and method for accessing wireless network |
US10560846B2 (en) * | 2014-09-08 | 2020-02-11 | Blackberry Limited | Method and apparatus for authenticating a network entity using unlicensed wireless spectrum |
US10142840B2 (en) * | 2015-01-29 | 2018-11-27 | Motorola Mobility Llc | Method and apparatus for operating a user client wireless communication device on a wireless wide area network |
US9717003B2 (en) * | 2015-03-06 | 2017-07-25 | Qualcomm Incorporated | Sponsored connectivity to cellular networks using existing credentials |
US9801055B2 (en) * | 2015-03-30 | 2017-10-24 | Qualcomm Incorporated | Authentication and key agreement with perfect forward secrecy |
CN111726804B (zh) * | 2015-06-05 | 2023-12-01 | 艾普拉控股有限公司 | 用于集成小型小区和Wi-Fi网络的统一认证 |
CN104967934A (zh) | 2015-06-12 | 2015-10-07 | 苏州佑克骨传导科技有限公司 | 适用于小功率骨传导耳机的振子 |
US10567964B2 (en) * | 2015-11-24 | 2020-02-18 | Futurewei Technologies, Inc. | Security for proxied devices |
EP4102871B1 (en) * | 2015-12-03 | 2025-02-05 | Telefonaktiebolaget LM Ericsson (publ) | Multi-rat security setup |
EP3873122A1 (en) * | 2016-01-05 | 2021-09-01 | Huawei Technologies Co., Ltd. | Avoiding a man-in-the-middle attack on an attach request message |
-
2016
- 2016-01-05 EP EP21163083.5A patent/EP3873122A1/en active Pending
- 2016-01-05 WO PCT/CN2016/070182 patent/WO2017117721A1/zh active Application Filing
- 2016-01-05 CN CN202110217266.1A patent/CN113271595B/zh active Active
- 2016-01-05 CN CN201910127640.1A patent/CN109729096B/zh active Active
- 2016-01-05 CN CN202110217137.2A patent/CN113055888B/zh active Active
- 2016-01-05 CN CN201680077927.2A patent/CN108702624B/zh active Active
- 2016-01-05 CN CN202110217166.9A patent/CN113271594A/zh active Pending
- 2016-01-05 JP JP2018553275A patent/JP6598225B2/ja active Active
- 2016-01-05 RU RU2018128207A patent/RU2706173C1/ru active
- 2016-01-05 KR KR1020187022094A patent/KR102125826B1/ko active Active
- 2016-01-05 EP EP16882868.9A patent/EP3393159B1/en active Active
- 2016-01-05 EP EP20192538.5A patent/EP3800914B1/en active Active
-
2018
- 2018-07-03 US US16/026,777 patent/US10419938B2/en active Active
-
2019
- 2019-08-27 US US16/552,530 patent/US10944786B2/en active Active
-
2020
- 2020-12-30 US US17/138,498 patent/US11310266B2/en active Active
-
2022
- 2022-04-18 US US17/723,257 patent/US11736519B2/en active Active
-
2023
- 2023-07-20 US US18/355,671 patent/US12003533B2/en active Active
-
2024
- 2024-05-20 US US18/668,898 patent/US20240396934A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101378591A (zh) * | 2007-08-31 | 2009-03-04 | 华为技术有限公司 | 终端移动时安全能力协商的方法、系统及装置 |
CN101384079A (zh) * | 2007-09-03 | 2009-03-11 | 华为技术有限公司 | 一种终端移动时防止降质攻击的方法、系统及装置 |
US20100115275A1 (en) * | 2008-11-03 | 2010-05-06 | Samsung Electronics Co. Ltd. | Security system and method for wireless communication system |
CN101835156A (zh) * | 2010-05-21 | 2010-09-15 | 中兴通讯股份有限公司 | 一种用户接入安全保护的方法及系统 |
US20140241317A1 (en) * | 2013-02-22 | 2014-08-28 | Samsung Electronics Co., Ltd. | Method and system for providing simultaneous connectivity between multiple e-nodebs and user equipment |
CN104967984A (zh) * | 2015-04-29 | 2015-10-07 | 大唐移动通信设备有限公司 | 一种获取用户设备的信息的方法和系统 |
Non-Patent Citations (1)
Title |
---|
"Mechanisms of Limit EIAO Usage for Emergency Call Purpose Only", 3GPP TSG-SA3 (SECURITY) MEETING SA3W55, 15 May 2009 (2009-05-15), pages 1 - 3 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022501857A (ja) * | 2018-08-09 | 2022-01-06 | オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. | 能力報告の方法及びデバイス |
JP7385648B2 (ja) | 2018-08-09 | 2023-11-22 | オッポ広東移動通信有限公司 | 能力報告の方法及びデバイス |
WO2021051974A1 (zh) * | 2019-09-16 | 2021-03-25 | 华为技术有限公司 | 一种空口信息的安全保护方法及装置 |
US12089045B2 (en) | 2019-09-16 | 2024-09-10 | Huawei Technologies Co., Ltd. | Air interface information security protection method and apparatus |
US20210021994A1 (en) * | 2019-10-07 | 2021-01-21 | Intel Corporation | Secure user equipment capability transfer for user equipment with no access stratum security |
US11617077B2 (en) * | 2019-10-07 | 2023-03-28 | Intel Corporation | Secure user equipment capability transfer for user equipment with no access stratum security |
CN114208240A (zh) * | 2020-01-22 | 2022-03-18 | 华为技术有限公司 | 数据传输方法、装置及系统 |
CN114208240B (zh) * | 2020-01-22 | 2024-01-30 | 华为技术有限公司 | 数据传输方法、装置及系统 |
Also Published As
Publication number | Publication date |
---|---|
RU2706173C1 (ru) | 2019-11-14 |
EP3800914A1 (en) | 2021-04-07 |
US20180324594A1 (en) | 2018-11-08 |
CN113055888B (zh) | 2022-03-08 |
EP3393159A1 (en) | 2018-10-24 |
US20220321599A1 (en) | 2022-10-06 |
CN113271594A (zh) | 2021-08-17 |
US10944786B2 (en) | 2021-03-09 |
CN109729096B (zh) | 2020-06-16 |
KR102125826B1 (ko) | 2020-06-23 |
CN113055888A (zh) | 2021-06-29 |
KR20180100365A (ko) | 2018-09-10 |
CN113271595B (zh) | 2022-03-08 |
US12003533B2 (en) | 2024-06-04 |
US11736519B2 (en) | 2023-08-22 |
US20190387404A1 (en) | 2019-12-19 |
CN113271595A (zh) | 2021-08-17 |
BR112018013812A2 (zh) | 2018-12-11 |
US11310266B2 (en) | 2022-04-19 |
JP6598225B2 (ja) | 2019-10-30 |
JP2019501608A (ja) | 2019-01-17 |
EP3800914B1 (en) | 2024-05-01 |
CN108702624B (zh) | 2021-02-23 |
US20240396934A1 (en) | 2024-11-28 |
EP3393159A4 (en) | 2018-12-19 |
CN108702624A (zh) | 2018-10-23 |
US20240098112A1 (en) | 2024-03-21 |
US20210194920A1 (en) | 2021-06-24 |
EP3393159B1 (en) | 2020-09-30 |
EP3873122A1 (en) | 2021-09-01 |
US10419938B2 (en) | 2019-09-17 |
CN109729096A (zh) | 2019-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017117721A1 (zh) | 移动通信方法、装置及设备 | |
US11412473B2 (en) | PDU session management | |
US8555064B2 (en) | Security system and method for wireless communication system | |
TWI463856B (zh) | 促進安全性配置的同步的方法和裝置 | |
US11889301B2 (en) | Security verification when resuming an RRC connection | |
JP2018510578A (ja) | 完全前方秘匿性を有する認証および鍵共有 | |
JP6725764B2 (ja) | 無線リソース制御接続の再確立 | |
WO2019071472A1 (zh) | 一种业务策略创建方法及装置 | |
WO2019213925A1 (zh) | 密钥更新方法、设备和存储介质 | |
WO2018228444A1 (zh) | 连接管理方法、终端及无线接入网设备 | |
BR112018013812B1 (pt) | Método e aparelho de comunicação móvel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16882868 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2018553275 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 122021001669 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112018013812 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016882868 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2016882868 Country of ref document: EP Effective date: 20180718 |
|
ENP | Entry into the national phase |
Ref document number: 20187022094 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112018013812 Country of ref document: BR Kind code of ref document: A2 Effective date: 20180705 |