Realize two kinds of adaptive methods of mobile phone identification mode in the personnel hand system
Technical field:
The present invention relates to the method for authenticating of personnel hand system (PHS) system, particularly relate to automatic identification and the sign passed through among a kind of PHS two kinds of mobile phone identification modes, realize that a system supports the adaptive method of two kinds of authentication modes simultaneously.Belong to communication technical field.
Background technology:
The PHS technology is the ripe at present a kind of mobile communcations system that develops, and this system realizes the safety of system by mobile phone is realized authentication, reaches and can't realize illegally forging number, the purpose of arbitrarily smearing machine.The use of authentication in the PHS system is very widely.For example, in Japanese NTT DoCoMo company, ASTEL company, DDI POCKET company all is operators of PHS system, at the mobile phone of the sales support FEAL32 of each operator in Japan, its system only supports the mobile phone that possesses the FEAL32 algorithm to network, and Japanese PHS equipment supplier also once opened the PHS system at Bangkok, THA, and the authentication of employing is STEPHI.At the present Personal Handyphone System Personal Handyphone System(PHS) of China Telecom, use also be the PHS technology, but at present each city of the subordinate of China Telecom is because the supplier's difference that adopts, its authentication mode has and adopts STEPHI, also has and adopts FEAL32's.Cause realizing the compatibility of cell phone apparatus, the mobile phone that promptly possesses the FEAL32 algorithm can only be sold to the system that supports FEAL32, and the mobile phone that possesses the STEPHI algorithm can only be sold to the system that supports STEPHI.From the popularization of PHS technology in the whole world, the disunity of method for authenticating brings huge difficulty for the all-round popularization plan from now on of PHS technology; Market from China, one tame operator of China Telecom, but have two kinds of PHS systems simultaneously, a system that only supports FEAL32, a system that only supports STEPHI, this give operator from now on the centralized purchasing mobile phone brought difficulty, in addition from now on if operator wishes to realize interconnecting of some areas Personal Handyphone System(PHS).If the mobile phone of two kinds of authentication modes that may exist in the native system can't be distinguished and identify in system,, realize that a system supports two kinds of authentication modes simultaneously, well imagines that realizing interconnects is impossible by the self adaptation of authentication mode.
Still do not retrieve relevant self adaptation up to now, realize that a system supports the technical literature of two kinds of mobile phone identification modes simultaneously by two kinds of authentication modes.
Summary of the invention:
The objective of the invention is to propose realize in a kind of personnel hand system two kinds of adaptive methods of mobile phone identification mode, so that in personnel hand system, realize the self adaptation of two kinds of authentication modes, be that system does not need to know in advance that certain mobile phone adopts who would have thought authentication mode, but the call by this mobile phone, automatically discern the authentication mode that this mobile phone adopts, and then realize that a system can support the mobile phone of two kinds of authentication modes simultaneously.
Main technical scheme of the present invention is: in the user attaching register, which kind of authentication mode the marker bit AuthType=0 for each cellphone subscriber increases its authentication mode of sign does not adopt because know this user at the beginning, so AuthType is initialized as 0.When certain mobile phone made a call, the user attaching register was at first judged its authentication mode marker bit AuthType, if AuthType=0 illustrates that this user calls out for the first time, does not know also which kind of authentication mode it adopts.The user attaching register produces random number RA D then, respectively with general FEAL32 algorithm generation authentication plain code RESULTfeal3264BIT, with general STEPHI algorithm generation authentication plain code RESULTstephi (64BIT).The mobile phone identification algorithm of mobile phone storage itself and this random number RA D produce authentication plain code RESULTphone64BIT, and 3 compare again.If RESULTphone equates with RESULTfeal32, think that then this mobile phone adopts the FEAL32 algorithm, is changed to 1 to this user's authentication mode marker bit AuthType.If RESULTphone equates with RESULTstephi, think that then this mobile phone adopts the STEPHI algorithm, is changed to 2 to this user's authentication mode marker bit AuthType.Call out for the first time,, just think that this mobile phone is a validated user as long as there is a kind of authentication arithmetic to pass through.If 2 kinds of authentication arithmetics all do not pass through, illustrate and initiate that current that call out is illegal user that then refuse its calling, it is 0 constant that AuthType remains.When calling out later on,, then can distinguish this mobile phone and adopt the FEAL32 algorithm if the user attaching register is judged AuthType=1.The user attaching register produces random number RA D, only with general FEAL32 algorithm generation authentication plain code RESULTfeal32, compares with the authentication plain code RESULTphone that mobile phone produces then.
If the user attaching register is judged AuthType=2 when calling out later on, then can distinguish this mobile phone and adopt the STEPHI algorithm.The user attaching register produces random number RA D, only with general STEPHI algorithm generation authentication plain code RESULTstephi, compares with the authentication plain code RESULTphone that mobile phone produces then.
Concrete steps are as follows:
Step 1: when mobile phone makes a call, judge this user's authentication mode marker bit AuthType, if be AuthType=0, illustrate also and can't judge the authentication mode that it adopts, execution in step 2,3,4,5,6; If AuthType=1 illustrates that it adopts the FEAL32 algorithm, execution in step 2,3,5,6; If AuthType=2 illustrates that it adopts the STEPHI algorithm, execution in step 2,4,5,6.
The user attaching register of step 2:PHS system produces random number RA D;
Step 3: the mobile phone identification password value that possesses with random number RA D and system side produces authentication plain code RESULTfeal3264BIT as the general FEAL32 algorithm of parameter call, then AuthType and RESULTfeal32 is sent to the base station controller of PHS system;
Step 4: the mobile phone identification password value that possesses with random number RA D and system side produces authentication plain code RESULTstephi64BIT as the general STEPHI algorithm of parameter call, then AuthType and RESULTstephi is sent to the base station controller of PHS system;
Step 5: D sends to mobile phone with random number RA, mobile phone is with the mobile phone identification password of RAD and mobile phone itself the storage input parameter as the authentication arithmetic that this machine adopted, also produce an authentication plain code RESULTphone64BIT,, send to the base station controller of PHS system by wireless channel;
Step 6: on base station controller:
Judge AuthType=0, promptly now also can't know the authentication arithmetic that this user adopts.Just authentication plain code RESULTphone is compared with RESULTfeal32, RESULTstephi respectively, if RESULTphone=RESULTfeal32 then notifies the user attaching register that this user's AuthType is changed to 1; If RESULTphone=RESULTstephi then notifies the user attaching register that this user's AuthType is changed to 2.And if have one to equate, just think and finished authentication.If all unequal, that the current calling of initiation is described is illegal user, then refuses its calling, and AuthType is constant.
Judge AuthType=1, promptly this user adopts the FEAL32 algorithm.Just RESULTphone and RESULTfeal32 are compared,, just think and finished authentication if equate; If unequal, then refuse its calling.
Judge AuthType=2, promptly this user adopts the STEPHI algorithm.Just RESULTphone and RESULTstephi are compared,, just think and finished authentication if equate; If unequal, then refuse its calling.
Adopt the method for the invention, make the equipment supplier to provide and to discern and to identify the authentication mode that mobile phone adopts automatically, self adaptation by the mobile phone identification mode, support the system of two kinds of authentication modes simultaneously, the mobile phone that possesses different authentication modes like this can use in the equipment that distinct device supplier produces.Adopt method of the present invention,, just can realize the self adaptation of two kinds of authentication modes, support two kinds of authentication modes simultaneously as long as to carrying out upgrading on the existing systems basis.For the intercommunication between each vendor equipment that will realize the PHS system from now on lays the foundation.Therefore adopting the present invention to obtain the PHS system can self adaptation and support the progress of various cell phone apparatus effectively to utilize existing investment.
Description of drawings:
Fig. 1 is the present invention's calling authorization flow chart first time, realizes the automatic identification and the sign of mobile phone identification mode.
Fig. 2 is after the present invention's mobile phone identification mode is discerned, in the later calling, and the authentication arithmetic flow chart of FEAL32.
Fig. 3 is after the present invention's mobile phone identification mode is discerned, in the later calling, and the authentication arithmetic flow chart of STEPHI.
Embodiment:
The present invention is described in further detail below in conjunction with accompanying drawing.
Fig. 1 is the calling authorization flow chart first time, realizes the other automatically and sign of knowledge of mobile phone identification mode.
As 101, this user's authentication mode sign Authtype=0 at first judges in system, is for the first time and calls out, and does not know also now which kind of authentication mode this user adopts.Produce 64bit random number RA D by random number generator 102, the authentication password 103 of the 64bit that obtains then in system side, random number RA D and authentication password will generate 106 RESULTstephi, 107 RESULTfeal32 respectively respectively as the input parameter of 104 STEPHI authentication arithmetics and 105 FEAL32 authentication arithmetics.Above step all is to carry out on the user attaching register of 114PHS system side.
System produces 64bit random number RA D by random number generator 102 will send mobile phone to by 113 radio paths, and the resident authentication password 112 of mobile phone itself is identical for its authentication password 112 of legal mobile phone with system side authentication password 103.With the authentication password of RAD and mobile phone side input parameter, will generate an authenticating result as the resident authentication arithmetic 111 of mobile phone itself.
Authenticating result 106 RESULTstephi, 107RESULTfeal32 that mobile phone side authenticating result 110 will be calculated with system side deliver to together on 108 base station controllers and compare.If 110 is identical with 106, think that then this mobile phone adopts the STEPHI authentication arithmetic, is changed to 2 by 109 AuthType.If 110 is identical with 107, think that then this mobile phone adopts the FEAL32 authentication arithmetic, is changed to 1 by 109 AuthType.This is to call out for the first time, as long as wherein there is one to equate, has just thought by authentication.If all unequal, that the current calling of initiation is described is illegal user, then refuses its calling, and AuthType is constant.
Fig. 2 is after certain mobile phone identification mode is discerned, in calling out later on, and the authentication arithmetic flow chart of FEAL32:
By calling out for the first time, system has identified this user and has adopted the FEAL32 authentication arithmetic.In the calling afterwards, system at first judges AuthType=1 by 201, promptly adopts the FEAL32 authentication arithmetic.Produce 64bit random number RA D by random number generator 202, obtain authentication password 203 then in system side, random number RA D and authentication password carry out computing and obtain (205) authenticating result RESULTfeal32 as 2 input parameters of 204FEAL32 authentication arithmetic.RAD and 209 mobile phone side authentication passwords obtain authenticating result 207RESULTfeal32 through the resident 208FEAL32 authentication arithmetic of mobile phone itself.Then by 206 comparators,,, then think and passed through authentication if equal 205 and 207 comparisons of entering.If unequal, that the current calling of initiation is described is illegal user, then refuses its calling.
Fig. 3 is after certain mobile phone identification mode is discerned, in calling out later on, and the authentication arithmetic flow chart of STEPHI:
By calling out for the first time, system has identified this user and has adopted the STEPHI authentication arithmetic.In the calling afterwards, system at first judges AuthType=2 by 301, promptly adopts the STEPHI authentication arithmetic.Produce 64bit random number RA D by random number generator 302, obtain authentication password 303 then in system side, random number RA D and authentication password carry out computing and obtain (305) authenticating result RESULTstephi as 2 input parameters of 304STEPHI authentication arithmetic.RAD and 309 mobile phone side authentication passwords obtain authenticating result 307RESULTstephi through the resident 308STIPHI authentication arithmetic of mobile phone itself ".Then by 306 comparators,,, then think and passed through authentication if equal 305 and 307 comparisons of entering.If unequal, that the current calling of initiation is described is illegal user, then refuses its calling.
In sum, in the PHS system, by the calling of mobile phone, use method of the present invention, can discern and identify the authentication mode that this mobile phone adopts automatically, realize the self adaptation of mobile phone identification mode, make a PHS system can support FEAL32 simultaneously, the mobile phone of two kinds of authentication modes of STEPHI.So, adopt the present invention, can improve existing systems very easily, make and originally only support a kind of system of authentication mode can realize supporting simultaneously STEPHI and two kinds of method for authenticating of FEAL32, like this for the mobile phone that possesses FEAL32 or STEPHI algorithm that has existed in the market, need not divide mobile phone to adopt which kind of authentication mode, thereby make these two kinds of mobile phones in this system, to use in the mobile phone proparea that networks.This kind is convenient to standard market to the self adaptation and the support of mobile phone authentication mode, makes a system support the authentication of dual mode simultaneously, also is convenient to realize interconnecting of variant PHS system of equipment vendors.
Above embodiment is only unrestricted in order to explanation the present invention, although the present invention is had been described in detail with reference to above preferred embodiment, those of ordinary skill in the art is to be understood that, can make amendment, be out of shape the present invention or be equal to replacement, and not breaking away from the spirit and scope of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.