摘要:
Embodiments of the present invention provide a key negotiation processing method and apparatus. The key negotiation processing method includes: acquiring, by a control network element, a first key negotiation parameter and a second key negotiation parameter; and sending, by the control network element, the first key negotiation parameter and/or the second key negotiation parameter to the first user equipment UE and a second UE, so that the first UE and the second UE generate a key according to the first key negotiation parameter and the second key negotiation parameter. According to the embodiments of the present invention, key negotiation may be performed between two UEs that perform proximity communication.
摘要:
The present invention relates to a key generation method, a master eNodeB, a secondary eNodeB, and user equipment. The key generation method includes: determining a key parameter corresponding to a data radio bearer DRB; sending the key parameter to user equipment corresponding to the DRB, so that the user equipment generates a user plane key according to the key parameter and a basic key generated by the user equipment; receiving a basic key generated by a master eNodeB and sent by the master eNodeB; and generating the user plane key according to the key parameter and the basic key generated by the master eNodeB.
摘要:
Embodiments of the present invention relate to a method and an apparatus for detecting a man-in-the-middle attack, and the method includes: receiving, by an MeNB, a first check request message sent by an SeNB, where the first check request message includes first identifier information and a first data packet count value; generating, by the MeNB, a second check request message according to the first identifier information, and sending the second check request message to a user terminal; receiving, by the MeNB, a first check response message generated by the user terminal according to the second check request message, where the first check response message includes second identifier information and a second data packet count value; and when the first data packet count value is the same as the second data packet count value, determining, by the MeNB, that no man-in-the-middle attack exists between the SeNB and the user terminal; or when the first data packet count value is different from the second data packet count value, determining, by the MeNB, that a man-in-the-middle attack exists between the SeNB and the user terminal.
摘要:
Embodiments of the present invention provide a negotiation processing method for a security algorithm, a control network element, and a control system. The negotiation processing method for a security algorithm includes: selecting, by a control network element according to a security capability of first UE and a security capability of second UE, a security algorithm supported by both the first UE and the second UE; and notifying, by the control network element, the selected security algorithm to the first UE and the second UE. By means of the embodiments of the present invention, negotiation of a security algorithm between two UEs in proximity communication can be implemented under the control of a control network element.
摘要:
An authentication method of IP multimedia subsystems includes: after the P-CSCF receives a register message transmitted by the UE (s112), the P-CSCF queries the determined the CLF (s113) for the attach information of the UE in the access network to obtain a query result (s114), and transmits a register message carrying the query result to the I-CSCF (s115); the I-CSCF forwards the register message to the S-CSCF which is informed by the UPSF/HSS (s116, s117), the S-CSCF authenticates the UE according to the authentication mode obtained from the UPSF/HSS to obtain an authentication result (s118), and sends the authentication result to the UE (s119, s120, s121, s122, s123). In the invention, the UPSF/HSS of service layer determines the authentication mode for user, and the S-CSCF accomplishes the authentication process, so it is more reasonable. The invention further provides an authentication method that combine an authentication mode binding IMS service layer authentication and access layer authentication with other authentication mode, ensuring that the user can be authenticated correctly even in the case of the failure of authentication mode binding IMS service layer authentication and access layer authentication.
摘要:
The present invention relates to a key generation method, a master eNodeB, a secondary eNodeB, and user equipment. The key generation method includes: determining a key parameter corresponding to a data radio bearer DRB; sending the key parameter to user equipment corresponding to the DRB, so that the user equipment generates a user plane key according to the key parameter and a basic key generated by the user equipment; receiving a basic key generated by a master eNodeB and sent by the master eNodeB; and generating the user plane key according to the key parameter and the basic key generated by the master eNodeB.