CN100349496C - Message authentication method - Google Patents

Message authentication method Download PDF

Info

Publication number
CN100349496C
CN100349496C CNB2005100842706A CN200510084270A CN100349496C CN 100349496 C CN100349496 C CN 100349496C CN B2005100842706 A CNB2005100842706 A CN B2005100842706A CN 200510084270 A CN200510084270 A CN 200510084270A CN 100349496 C CN100349496 C CN 100349496C
Authority
CN
China
Prior art keywords
authentication
message
base station
terminal
digital certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100842706A
Other languages
Chinese (zh)
Other versions
CN1802018A (en
Inventor
李永茂
肖正飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005100842706A priority Critical patent/CN100349496C/en
Publication of CN1802018A publication Critical patent/CN1802018A/en
Application granted granted Critical
Publication of CN100349496C publication Critical patent/CN100349496C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention discloses a message authentication method which is applied to authentication between a terminal MS and a base station BS. The method comprises that MS transmits an authentication request message to BS; after BS receives the authentication request message and authenticates the message, BS transmits an authentication reply message containing a digital certificate and a private key signature of BS to MS; after MS receives the authentication reply message, the message is authenticated according to the digital certificate and the private key signature in the message to judge whether the message passes through authentication, and MS discards the message from BS after the message is judged not to pass through the authentication. The preset invention realizes the authentication of the authentication reply message from BS by MS in a mode that BS transmits the authentication reply message containing the digital certificate and the private key signature of BS to MS, MS authenticates the message according to the digital certificate and the private key signature in the message, and the message is discarded after the message does not pass through the authentication; MS can recognize a false authentication reply message, and thus, the safety of the RSA authentication is enhanced.

Description

A kind of message authentication method
Technical field
The present invention relates to the technology that improves the wireless communication system fail safe, specially refer to the message authentication method between a kind of MS and the BS.
Background technology
In communication system, fail safe is an important indicator of estimating a communication system performance quality, particularly in wireless communication system, because wireless communication system has open and ambulant characteristics, makes the fail safe of wireless communication system seem particularly important.Along with the development of cryptography and cryptoanalysis, can be by the mode that the last data of transmitting of the air interface (abbreviation is eated dishes without rice or wine) of wireless communication system are encrypted, the fail safe that improves wireless communication system.
IEEE 802.16d/e serial protocols has defined WiMAX and has fixed and moved the consensus standard that inserts the part of eating dishes without rice or wine.In order to guarantee the safety of data transmission of eating dishes without rice or wine, above-mentioned serial protocols has defined a Security Sublayer (Privacy Sublayer), is used to realize the distribution of authentication, key to wireless communication system user and management and follow-up data encryption and authentication or the like.According to agreement regulation, on authentication mode, use Revest-Shamir-Adleman Algorithm (RSA) authentication method (by the public key encryption algorithm of Rivest, Shamir, Adleman exploitation) to achieve a butt joint into the authentication of the terminal (MS) of base station (BS) based on digital certificate.
In IEEE 802.16e draft agreement D9, disclose MS and inserted key management second edition (Privacy Key Managentment Version 2, PKMv2) the Revest-Shamir-Adleman Algorithm (RSA) authentication flow process that is adopted in the BS process.As shown in Figure 1, when by BS MS being authenticated, this identifying procedure may further comprise the steps:
Step 101, MS send Revest-Shamir-Adleman Algorithm (RSA) authentication request message (PKMv2 RSA-Request) to BS, comprise digital certificate (MS_Certificate) and the private key signature (SigSS) of MS in this authentication request message.Table 1 is depicted as the attribute information that the Revest-Shamir-Adleman Algorithm (RSA) authentication request message comprises, wherein except that the digital certificate and private key signature of MS, has also comprised being used to prevent 64 random numbers (MS_Random) that produced by MS of Replay Attack and the SAID that is used for follow-up safe connection management.
Attribute Content
MS_Random 64 random numbers that MS produces
MS_Certificate The digital certificate X.509 of MS
SigSS MS is to the signature of all properties in the message
SAID The SAID of MS is identical with Basic CID
Table 1
Step 102, BS authenticate this message according to digital certificate in this message and private key signature after receiving the Revest-Shamir-Adleman Algorithm (RSA) authentication request message of MS transmission, and judge whether by authentication, if then execution in step 103; Otherwise execution in step 105.
In this step, BS is specially the method that message authenticates according to digital certificate and private key signature: BS at first obtains the PKI of MS by digital certificate, utilizes this PKI to judge whether private key signature is legal then.Further, BS can also utilize self storage or the PKI of the digital certificate issuing organization that obtains by escape way, and the private key signature of issuing organization on the digital certificate is authenticated, and judges whether digital certificate is legal.
Step 103, BS return Revest-Shamir-Adleman Algorithm (RSA) authentication by message (PKMv2 RSA-Reply) to MS, and execution in step 104 then.
Step 104, MS receive from the Revest-Shamir-Adleman Algorithm (RSA) authentication of BS by after the message, return Revest-Shamir-Adleman Algorithm (RSA) authentication acknowledge message (PKMv2 RSA-Acknowledgement) to BS, and this MS of notice BS has received Revest-Shamir-Adleman Algorithm (RSA) authentication by message, finishes this flow process then.
Step 105, BS return Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information (PKMv2 RSA-Reject) to MS, comprise the private key signature (SigBS) of BS in this message, and execution in step 106 then.
Attribute Content
MS_Random 64 random numbers that MS produces
BS_Random 64 random numbers that BS produces
Error-Code The reason-code of refusal authentication
Display String (optional) The reason of the refusal authentication that shows
SigBS BS is to the signature of all properties in the message
Table 2
Table 2 is depicted as the attribute information that the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information comprises, wherein except that the private key signature of BS, also comprised and be used to prevent the MS_Random of Replay Attack and 64 random numbers (BS_Random) that BS produces, the refusal authentication reason (Display String) that is used to that the error code (Error-Code) of refusal authentication reason is described and is used to show.Wherein, Display String is an option, promptly also can not comprise this attribute information in this message.
Step 106, MS return the Revest-Shamir-Adleman Algorithm (RSA) authentication acknowledge message to BS, and this MS of notice BS has received the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information, finishes this flow process then.
From above-mentioned flow process as can be seen, though BS comprises the private key signature of BS in the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information that MS returns, but MS is after receiving the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information, owing to there is not the digital certificate of BS, can't utilize the private key signature of BS that this message is authenticated, thereby when the assailant when MS sends the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information, MS can not identify by the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information of authentication with falseness; And, owing to there is not the digital certificate of BS, MS is after receiving the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information, also can't authenticate BS, then when the assailant palms off BS to MS transmission Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information, MS also can't authenticate the transmit leg identity, thereby has stoped the normal access network of MS, has reduced the fail safe of Revest-Shamir-Adleman Algorithm (RSA) authentication.
Summary of the invention
In order to solve the problems of the technologies described above, the invention provides a kind of message authentication method, be applied to the authentication between terminal and the base station, this method can realize that terminal is to replying the authentication of message from the authentication of base station, message is replied in the authentication of falseness identify, improve the fail safe of Revest-Shamir-Adleman Algorithm (RSA) authentication.
For achieving the above object, the invention provides a kind of message authentication method, be applied to the authentication between terminal and the base station, this method comprises:
A, terminal send authentication request message to the base station, and the base station receives this authentication request message and this message is authenticated;
B, base station comprise the digital certificate of this base station and the authentication answer message of private key signature to the terminal transmission;
After C, terminal receive described authentication answer message from the base station, according to digital certificate in this message and private key signature this message is authenticated, judge whether by authentication, and after judging, abandon described authentication answer message from the base station not by authentication.
Terminal described in the step C authenticates and can comprise this message according to digital certificate in this message and private key signature:
C1, terminal obtain the PKI of base station by digital certificate, utilize this PKI that described private key signature is authenticated then.
Preferably, further comprise before or after the described step C1:
Terminal is utilized the PKI of this digital certificate issuing organization, and the private key signature of issuing organization on the digital certificate is authenticated.
Preferably, if judge among the step C, further comprise by after the authentication:
The terminal informing base station has received described authentication and has replied message.
Terminal described in the step C receives described authentication from the base station and replys after the message, may further include:
Whether message is replied in this authentication of terminal judges is that this terminal sends authentication request message to the base station and begins to receive in the predefined time, if then carry out the described step that this message is authenticated according to the digital certificate in this message and private key signature; Otherwise, directly finish this flow process.
Described digital certificate can be the X.509 digital certificate of base station.
Described authentication reply message can for: Revest-Shamir-Adleman Algorithm (RSA) authentication passes through message.
Described Revest-Shamir-Adleman Algorithm (RSA) authentication is by may further include in the message:
64 random numbers that 64 random numbers that the terminal that described terminal comprises in the authentication request message that the base station sends produces, base station produce, with the basic key that is used to derive from basic KI, password life span and the keying sequence of the public key encryption of terminal number.
Message is replied in described authentication can also be the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information.
May further include in the described Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information:
64 random numbers that 64 random numbers that the terminal that described terminal comprises in the authentication request message that the base station sends produces, base station produce and the reason-code of refusing authentication;
Perhaps further comprise: the refusal authentication reason that is used to show.
From above scheme as can be seen, send the authentication that comprises this base station digital certificate and private key signature by the base station to terminal among the present invention and reply message, after terminal receives this message, according to digital certificate in this message and private key signature this message is authenticated, and after not by authentication, abandon this message, thereby realized that terminal to reply the authentication of message from the authentication of base station, makes terminal the authentication of falseness can be replied message and identifies, improved the fail safe of Revest-Shamir-Adleman Algorithm (RSA) authentication;
And in the present invention, when above-mentioned message from the base station is authentication during refuse information, terminal is authenticating the authentication refuse information, not by after promptly abandon this message, avoided terminal because false authentication refuse information is prevented from access;
In addition, terminal is when authenticating the authentication answer message from the base station among the present invention, not only private key signature is authenticated by digital certificate, also utilize the PKI of the mechanism that issues digital certificate, private key signature to issuing organization on the digital certificate authenticates, not only realized the authentication from the message of base station has also been realized the further authentication to the legitimacy of base station in the message, the fail safe that has further improved Revest-Shamir-Adleman Algorithm (RSA) authentication.
Description of drawings
Fig. 1 inserts the PKMv2 Revest-Shamir-Adleman Algorithm (RSA) authentication flow chart that adopts in the process of BS for disclosing MS among the 802.16e draft agreement D9;
Fig. 2 is the overview flow chart of the embodiment of the invention;
Fig. 3 is for having used PKMv2 Revest-Shamir-Adleman Algorithm (RSA) authentication flow chart of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Main thought of the present invention is, in the Revest-Shamir-Adleman Algorithm (RSA) authentication process, the base station receives the authentication request message of self terminal, and after this message authenticated, and sends the digital certificate that comprises this base station and message is replied in the authentication of private key signature to terminal; After the message that comprises digital certificate and private key signature of terminal reception from the base station, this message is authenticated, and judge whether authentication is passed through, after judging, do not abandon this message from the base station by authentication according to digital certificate in this message and private key signature.
Below describe the present invention by specific embodiment.
The overall procedure of the specific embodiment of the invention Figure 2 shows that step 101 among Fig. 1 as shown in Figure 2, and MS sends Revest-Shamir-Adleman Algorithm (RSA) authentication request message and step 102 to BS, and BS receives the flow process after this message authenticates, and specifically comprises step:
Step 201, BS comprise the digital certificate of this BS and the Revest-Shamir-Adleman Algorithm (RSA) authentication answer message of private key signature to the MS transmission.
Step 202, MS authenticate this message according to digital certificate in this message and private key signature, and judge whether authentication is passed through, if execution in step 203 is passed through in authentication after receiving and replying message from the above-mentioned Revest-Shamir-Adleman Algorithm (RSA) authentication of BS; Otherwise, execution in step 204.
In this step, MS replys to the Revest-Shamir-Adleman Algorithm (RSA) authentication from BS that receives that the authentication method in the step 102 can be identical among method that message authenticates and Fig. 1, be specially: MS at first obtains the PKI of BS by digital certificate, utilize this PKI to private key signature legal authentication the whether then, if legal then authentication is passed through; Otherwise for authentication is not passed through.In addition, MS authenticates the message from BS that receives and can further include: MS utilizes self storage or the PKI of the mechanism that issues digital certificate that obtains by escape way, private key signature to issuing organization on the digital certificate authenticates, thereby judge whether digital certificate is legal, if legal then authentication is passed through, otherwise for not passing through.
Step 203, MS send the Revest-Shamir-Adleman Algorithm (RSA) authentication acknowledge message to BS, and this MS of notice BS has received the message that BS sends to MS in the above-mentioned steps 201.
Step 204, MS directly abandon the message from BS that is received.
It can be that BS is receiving the request of MS transmission Revest-Shamir-Adleman Algorithm (RSA) authentication that the Revest-Shamir-Adleman Algorithm (RSA) authentication that BS sends to MS in the above-mentioned flow process is replied message, authenticating by the back and pass through message to the Revest-Shamir-Adleman Algorithm (RSA) authentication that MS returns, also can be to authenticate the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information of not returning to MS by the back.
Referring to table 3, be BS digital certificate (BS_Certificate) and the private key signature attribute information of Revest-Shamir-Adleman Algorithm (RSA) authentication by comprising in the message.Wherein the concrete format and content of the digital certificate of BS can be with reference to disclosed format and content in the IEEE802.16 agreement.In addition, as can be seen from Table 3, Revest-Shamir-Adleman Algorithm (RSA) authentication is by also having comprised MS_Random and the BS_Random that is used to prevent Replay Attack in the message, and the basic key that is used to derive from basic KI (Encrypted pre-PAK), password life span (Key Lifetime) and the keying sequence number attribute informations of encrypting such as (Key Sequence Number).
Referring to table 4, be BS digital certificate and the private key signature attribute information that comprises in the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information.Other attribute informations in the table 4 can repeat no more here referring to the explanation of attribute information in the his-and-hers watches 1.
Attribute Content
MS_Random 64 random numbers that MS produces
BS_Random 64 random numbers that BS produces
Encrypted pre-PAK Pre-PAK (RSA-PAEP-Encrypt (PubKey (MS), pre-PAK|SS ID)) with the public key encryption of MS
Key Lifetime Basic KI (PAK) Password Ageing timer
Key Sequence Number The PAK sequence number
BS_Certificate The X.509 digital certificate of BS
SigBS BS is to the signature of all properties in the message
Table 3
Attribute Content
MS_Random 64 random numbers that MS produces
BS_Random 64 random numbers that BS produces
Error-Code The reason-code of refusal authentication
Display String (optional) The reason of the refusal authentication that shows
BS_Certificate The X.509 digital certificate of BS
SigBS BS is to the signature of all properties in the message
Table 4
Further the present invention will be described in detail by having used PKMv2 Revest-Shamir-Adleman Algorithm (RSA) authentication flow process of the present invention more below.Figure 3 shows that and used PKMv2 Revest-Shamir-Adleman Algorithm (RSA) authentication flow process of the present invention that wherein step 301 and step 302 are identical with step 101 and step 102 among Fig. 1.Authentication comprises that by back execution in step 303:BS generation the digital certificate of self and the Revest-Shamir-Adleman Algorithm (RSA) authentication of private key signature pass through message in step 302, and this message is sent to MS.Then in step 304, MS receives from the Revest-Shamir-Adleman Algorithm (RSA) authentication of BS by after the message, according to private key signature in this message and digital certificate this message is authenticated, and judge whether authentication is passed through, if authentication is by execution in step 305, it has received Revest-Shamir-Adleman Algorithm (RSA) authentication and has passed through message to send the authenticate-acknowledge message informing to BS; Otherwise execution in step 306 directly abandons this message.And in step 302, BS comprises the digital certificate of self and the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information of private key signature by back execution in step 307:BS generation to the authentication of MS, and this message is sent to MS.Then in step 308, after MS receives Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information from BS, according to private key signature in this message and digital certificate this message is authenticated, if authentication by execution in step 309, sends the Revest-Shamir-Adleman Algorithm (RSA) authentication acknowledge message to BS and notifies it to receive the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information; Otherwise execution in step 310 directly abandons this message.
In the above-mentioned steps 301, MS can also start predefined timer after sending authentication request message to BS, then in step 304 and step 308, MS judges whether timer is overtime earlier after receiving and replying message from the authentication of BS, if timer expiry then directly finishes this flow process; Otherwise authentication answer message is authenticated described in execution in step 304 and the step 308.
In addition, MS can also judge whether to have received the Revest-Shamir-Adleman Algorithm (RSA) authentication answer message from BS behind timer expiry, and this message authentication is passed through, if then directly finish this flow process; Otherwise MS sends the Revest-Shamir-Adleman Algorithm (RSA) authentication request message to BS again.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being made, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of message authentication method is applied to the authentication between terminal and the base station, comprising:
A, terminal send authentication request message to the base station, and the base station receives this authentication request message and this message is authenticated;
It is characterized in that after the described steps A, this method comprises:
B, base station comprise the digital certificate of this base station and the authentication answer message of private key signature to the terminal transmission;
After C, terminal receive described authentication answer message from the base station, according to digital certificate in this message and private key signature this message is authenticated, judge whether by authentication, and after judging, abandon described authentication answer message from the base station by authentication.
2, method according to claim 1 is characterized in that, terminal described in the step C authenticates this message according to the digital certificate in this message and private key signature and comprises:
C1, terminal obtain the PKI of base station by digital certificate, utilize this PKI that described private key signature is authenticated then.
3, method according to claim 2 is characterized in that, further comprises before or after the described step C1:
Terminal is utilized the PKI of this digital certificate issuing organization, and the private key signature of issuing organization on the digital certificate is authenticated.
4, method according to claim 1 is characterized in that, if judge among the step C by after the authentication, further comprises:
The terminal informing base station has received described authentication and has replied message.
5, method according to claim 1 is characterized in that, terminal described in the step C receives described authentication from the base station and replys after the message, further comprises:
Whether message is replied in this authentication of terminal judges is that this terminal sends authentication request message to the base station and begins to receive in the predefined time, if then carry out the described step that this message is authenticated according to the digital certificate in this message and private key signature; Otherwise, directly finish this flow process.
6, according to arbitrary described method in the claim 1 to 5, it is characterized in that described digital certificate is: the X.509 digital certificate of base station.
According to arbitrary described method in the claim 1 to 5, it is characterized in that 7, described authentication is replied message and is: Revest-Shamir-Adleman Algorithm (RSA) authentication passes through message.
8, method according to claim 7 is characterized in that, described Revest-Shamir-Adleman Algorithm (RSA) authentication is by further comprising in the message:
64 random numbers that 64 random numbers that the terminal that described terminal comprises in the authentication request message that the base station sends produces, base station produce, with the basic key that is used to derive from basic KI, password life span and the keying sequence of the public key encryption of terminal number.
According to arbitrary described method in the claim 1 to 5, it is characterized in that 9, described authentication is replied message and is: the Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information.
10, method according to claim 9 is characterized in that, further comprises in the described Revest-Shamir-Adleman Algorithm (RSA) authentication refuse information:
64 random numbers that 64 random numbers that the terminal that described terminal comprises in the authentication request message that the base station sends produces, base station produce and the reason-code of refusing authentication;
Perhaps further comprise: the refusal authentication reason that is used to show.
CNB2005100842706A 2005-07-15 2005-07-15 Message authentication method Expired - Fee Related CN100349496C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100842706A CN100349496C (en) 2005-07-15 2005-07-15 Message authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100842706A CN100349496C (en) 2005-07-15 2005-07-15 Message authentication method

Publications (2)

Publication Number Publication Date
CN1802018A CN1802018A (en) 2006-07-12
CN100349496C true CN100349496C (en) 2007-11-14

Family

ID=36811709

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100842706A Expired - Fee Related CN100349496C (en) 2005-07-15 2005-07-15 Message authentication method

Country Status (1)

Country Link
CN (1) CN100349496C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296482B (en) * 2007-04-28 2012-12-12 华为技术有限公司 Method, base station, relay station and relay communication system implementing message authentication
CN101394395B (en) * 2007-09-18 2012-04-04 华为技术有限公司 Authentication method, system and device
CN101272616B (en) * 2008-05-07 2012-05-30 广州杰赛科技股份有限公司 Safety access method of wireless metropolitan area network
CN101640886B (en) * 2008-07-29 2012-04-25 上海华为技术有限公司 Authentication method, re-authentication method and communication device
CN101640887B (en) * 2008-07-29 2012-10-03 上海华为技术有限公司 Authentication method, communication device and communication system
CN102143489A (en) 2010-02-01 2011-08-03 华为技术有限公司 Method, device and system for authenticating relay node
EP3565178B1 (en) * 2017-01-25 2021-03-17 Huawei Technologies Co., Ltd. Message protection method, user device and core network device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1559117A (en) * 2001-11-29 2004-12-29 Use of a public key pair in terminal equipment for authentication and authorization of telecommunication user with network operator and business partner

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1559117A (en) * 2001-11-29 2004-12-29 Use of a public key pair in terminal equipment for authentication and authorization of telecommunication user with network operator and business partner

Also Published As

Publication number Publication date
CN1802018A (en) 2006-07-12

Similar Documents

Publication Publication Date Title
KR101447726B1 (en) The generation method and the update method of authorization key for mobile communication
US8559642B2 (en) Cryptographic communication with mobile devices
CN100349496C (en) Message authentication method
US9450756B2 (en) Method and system for authenticating entity based on symmetric encryption algorithm
CN100571124C (en) Prevent the method for Replay Attack and guarantee the unduplicated method of message SN
US8914643B2 (en) Anonymous authentication system and anonymous authentication method
RU2444143C2 (en) Method of double-sided authentication of access
CN101242274B (en) Method for guaranteeing non-duplicate message SN and preventing from re-play attack and mobile terminal
EP2327240B1 (en) Method and device for confirming authenticity of a public key infrastructure (pki) transaction event
RU2008109827A (en) MOBILE STATION, RADIO ACCESS NETWORK DEVICE, MOBILE SWITCHING STATION, MOBILE COMMUNICATION SYSTEM AND METHOD OF GIVING ACCESS TO COMMUNICATION SERVICES
RU2011105187A (en) PROTOCOL OF LINKING THE DEVICE TO THE STATION
CN100488281C (en) Method for acquring authentication cryptographic key context from object base station
CN100344208C (en) Identification method for preventing replay attack
CN105635094A (en) Security authentication method, security authentication device and security verification system
CN100456884C (en) Re-identifying method in wireless communication system
CA2371365C (en) Integrity protection method for radio network signaling
US20100042844A1 (en) Method, base station, relay station and relay communication system for implementing message authentication
CN100479376C (en) Method of distinguishing playback management message
CN101394395B (en) Authentication method, system and device
AU2010284792A1 (en) Method and apparatus for reducing overhead for integrity check of data in wireless communication system
CN101022330A (en) Method and module for raising key management authorized information security
Huang et al. Improving Security Levels of IEEE802. 16e Authentication by Involving Diffie-Hellman PKDS.
CN110289961A (en) Tele-medicine authentication method
CN101350748B (en) Method and system for accessing control terminal after being losing to obtain data summary calculation parameter
CN101742511A (en) Method for fusing WiMAX equipment with WMAN-SA and wireless metropolitan area network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071114