CN1264370C - Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system - Google Patents

Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system Download PDF

Info

Publication number
CN1264370C
CN1264370C CN01131665.9A CN01131665A CN1264370C CN 1264370 C CN1264370 C CN 1264370C CN 01131665 A CN01131665 A CN 01131665A CN 1264370 C CN1264370 C CN 1264370C
Authority
CN
China
Prior art keywords
authentication
mobile phone
user
kinds
mobile telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN01131665.9A
Other languages
Chinese (zh)
Other versions
CN1430441A (en
Inventor
丁贵祥
孙云韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN01131665.9A priority Critical patent/CN1264370C/en
Publication of CN1430441A publication Critical patent/CN1430441A/en
Application granted granted Critical
Publication of CN1264370C publication Critical patent/CN1264370C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method for realizing the adaptation of the authentication modes of two kinds of mobile telephones in a personal hand-held system. An authentication mark bit for storing the mark value of an authentication algorithm in the management apparatus of a PHS user mobile telephone. When a user initiates a call for the first time, the present invention starts different authentication algorithms to generate evident codes taking the random numbers of the mobile telephone as parameters. The present invention compares whether the evident codes are consistent with authentication evident codes which are stored by the mobile telephone and take the data transmitted to the mobile telephone by an authentication algorithm base station site as parameters, if true, then completes adaptive authentication process, sets the relevant mark value in the authentication mark bit, else, judges the user initiating the call as an illegal user, refuses the call, and does not change the authentication mark bit. When the user initiates the call again, the present invention consults the mark value firstly, starts relevant authentication algorithms, generates evident codes taking mobile telephone data as parameters, then carries out the comparison again, and completes the adaptive authentication process. The system does not need to know authentication modes adopted by the mobile telephone in advance, and automatically recognizes the authentication modes adopted by the mobile telephone through the first call of the mobile telephone. Therefore, one system can simultaneously support the authentication modes of two kinds of mobile telephones.

Description

Realize two kinds of adaptive methods of mobile phone identification mode in the personnel hand system
Technical field:
The present invention relates to the method for authenticating of personnel hand system (PHS) system, particularly relate to automatic identification and the sign passed through among a kind of PHS two kinds of mobile phone identification modes, realize that a system supports the adaptive method of two kinds of authentication modes simultaneously.Belong to communication technical field.
Background technology:
The PHS technology is the ripe at present a kind of mobile communcations system that develops, and this system realizes the safety of system by mobile phone is realized authentication, reaches and can't realize illegally forging number, the purpose of arbitrarily smearing machine.The use of authentication in the PHS system is very widely.For example, in Japanese NTT DoCoMo company, ASTEL company, DDI POCKET company all is operators of PHS system, at the mobile phone of the sales support FEAL32 of each operator in Japan, its system only supports the mobile phone that possesses the FEAL32 algorithm to network, and Japanese PHS equipment supplier also once opened the PHS system at Bangkok, THA, and the authentication of employing is STEPHI.At the present Personal Handyphone System Personal Handyphone System(PHS) of China Telecom, use also be the PHS technology, but at present each city of the subordinate of China Telecom is because the supplier's difference that adopts, its authentication mode has and adopts STEPHI, also has and adopts FEAL32's.Cause realizing the compatibility of cell phone apparatus, the mobile phone that promptly possesses the FEAL32 algorithm can only be sold to the system that supports FEAL32, and the mobile phone that possesses the STEPHI algorithm can only be sold to the system that supports STEPHI.From the popularization of PHS technology in the whole world, the disunity of method for authenticating brings huge difficulty for the all-round popularization plan from now on of PHS technology; Market from China, one tame operator of China Telecom, but have two kinds of PHS systems simultaneously, a system that only supports FEAL32, a system that only supports STEPHI, this give operator from now on the centralized purchasing mobile phone brought difficulty, in addition from now on if operator wishes to realize interconnecting of some areas Personal Handyphone System(PHS).If the mobile phone of two kinds of authentication modes that may exist in the native system can't be distinguished and identify in system,, realize that a system supports two kinds of authentication modes simultaneously, well imagines that realizing interconnects is impossible by the self adaptation of authentication mode.
Still do not retrieve relevant self adaptation up to now, realize that a system supports the technical literature of two kinds of mobile phone identification modes simultaneously by two kinds of authentication modes.
Summary of the invention:
The objective of the invention is to propose realize in a kind of personnel hand system two kinds of adaptive methods of mobile phone identification mode, so that in personnel hand system, realize the self adaptation of two kinds of authentication modes, be that system does not need to know in advance that certain mobile phone adopts who would have thought authentication mode, but the call by this mobile phone, automatically discern the authentication mode that this mobile phone adopts, and then realize that a system can support the mobile phone of two kinds of authentication modes simultaneously.
Main technical scheme of the present invention is: in the user attaching register, which kind of authentication mode the marker bit AuthType=0 for each cellphone subscriber increases its authentication mode of sign does not adopt because know this user at the beginning, so AuthType is initialized as 0.When certain mobile phone made a call, the user attaching register was at first judged its authentication mode marker bit AuthType, if AuthType=0 illustrates that this user calls out for the first time, does not know also which kind of authentication mode it adopts.The user attaching register produces random number RA D then, respectively with general FEAL32 algorithm generation authentication plain code RESULTfeal3264BIT, with general STEPHI algorithm generation authentication plain code RESULTstephi (64BIT).The mobile phone identification algorithm of mobile phone storage itself and this random number RA D produce authentication plain code RESULTphone64BIT, and 3 compare again.If RESULTphone equates with RESULTfeal32, think that then this mobile phone adopts the FEAL32 algorithm, is changed to 1 to this user's authentication mode marker bit AuthType.If RESULTphone equates with RESULTstephi, think that then this mobile phone adopts the STEPHI algorithm, is changed to 2 to this user's authentication mode marker bit AuthType.Call out for the first time,, just think that this mobile phone is a validated user as long as there is a kind of authentication arithmetic to pass through.If 2 kinds of authentication arithmetics all do not pass through, illustrate and initiate that current that call out is illegal user that then refuse its calling, it is 0 constant that AuthType remains.When calling out later on,, then can distinguish this mobile phone and adopt the FEAL32 algorithm if the user attaching register is judged AuthType=1.The user attaching register produces random number RA D, only with general FEAL32 algorithm generation authentication plain code RESULTfeal32, compares with the authentication plain code RESULTphone that mobile phone produces then.
If the user attaching register is judged AuthType=2 when calling out later on, then can distinguish this mobile phone and adopt the STEPHI algorithm.The user attaching register produces random number RA D, only with general STEPHI algorithm generation authentication plain code RESULTstephi, compares with the authentication plain code RESULTphone that mobile phone produces then.
Concrete steps are as follows:
Step 1: when mobile phone makes a call, judge this user's authentication mode marker bit AuthType, if be AuthType=0, illustrate also and can't judge the authentication mode that it adopts, execution in step 2,3,4,5,6; If AuthType=1 illustrates that it adopts the FEAL32 algorithm, execution in step 2,3,5,6; If AuthType=2 illustrates that it adopts the STEPHI algorithm, execution in step 2,4,5,6.
The user attaching register of step 2:PHS system produces random number RA D;
Step 3: the mobile phone identification password value that possesses with random number RA D and system side produces authentication plain code RESULTfeal3264BIT as the general FEAL32 algorithm of parameter call, then AuthType and RESULTfeal32 is sent to the base station controller of PHS system;
Step 4: the mobile phone identification password value that possesses with random number RA D and system side produces authentication plain code RESULTstephi64BIT as the general STEPHI algorithm of parameter call, then AuthType and RESULTstephi is sent to the base station controller of PHS system;
Step 5: D sends to mobile phone with random number RA, mobile phone is with the mobile phone identification password of RAD and mobile phone itself the storage input parameter as the authentication arithmetic that this machine adopted, also produce an authentication plain code RESULTphone64BIT,, send to the base station controller of PHS system by wireless channel;
Step 6: on base station controller:
Judge AuthType=0, promptly now also can't know the authentication arithmetic that this user adopts.Just authentication plain code RESULTphone is compared with RESULTfeal32, RESULTstephi respectively, if RESULTphone=RESULTfeal32 then notifies the user attaching register that this user's AuthType is changed to 1; If RESULTphone=RESULTstephi then notifies the user attaching register that this user's AuthType is changed to 2.And if have one to equate, just think and finished authentication.If all unequal, that the current calling of initiation is described is illegal user, then refuses its calling, and AuthType is constant.
Judge AuthType=1, promptly this user adopts the FEAL32 algorithm.Just RESULTphone and RESULTfeal32 are compared,, just think and finished authentication if equate; If unequal, then refuse its calling.
Judge AuthType=2, promptly this user adopts the STEPHI algorithm.Just RESULTphone and RESULTstephi are compared,, just think and finished authentication if equate; If unequal, then refuse its calling.
Adopt the method for the invention, make the equipment supplier to provide and to discern and to identify the authentication mode that mobile phone adopts automatically, self adaptation by the mobile phone identification mode, support the system of two kinds of authentication modes simultaneously, the mobile phone that possesses different authentication modes like this can use in the equipment that distinct device supplier produces.Adopt method of the present invention,, just can realize the self adaptation of two kinds of authentication modes, support two kinds of authentication modes simultaneously as long as to carrying out upgrading on the existing systems basis.For the intercommunication between each vendor equipment that will realize the PHS system from now on lays the foundation.Therefore adopting the present invention to obtain the PHS system can self adaptation and support the progress of various cell phone apparatus effectively to utilize existing investment.
Description of drawings:
Fig. 1 is the present invention's calling authorization flow chart first time, realizes the automatic identification and the sign of mobile phone identification mode.
Fig. 2 is after the present invention's mobile phone identification mode is discerned, in the later calling, and the authentication arithmetic flow chart of FEAL32.
Fig. 3 is after the present invention's mobile phone identification mode is discerned, in the later calling, and the authentication arithmetic flow chart of STEPHI.
Embodiment:
The present invention is described in further detail below in conjunction with accompanying drawing.
Fig. 1 is the calling authorization flow chart first time, realizes the other automatically and sign of knowledge of mobile phone identification mode.
As 101, this user's authentication mode sign Authtype=0 at first judges in system, is for the first time and calls out, and does not know also now which kind of authentication mode this user adopts.Produce 64bit random number RA D by random number generator 102, the authentication password 103 of the 64bit that obtains then in system side, random number RA D and authentication password will generate 106 RESULTstephi, 107 RESULTfeal32 respectively respectively as the input parameter of 104 STEPHI authentication arithmetics and 105 FEAL32 authentication arithmetics.Above step all is to carry out on the user attaching register of 114PHS system side.
System produces 64bit random number RA D by random number generator 102 will send mobile phone to by 113 radio paths, and the resident authentication password 112 of mobile phone itself is identical for its authentication password 112 of legal mobile phone with system side authentication password 103.With the authentication password of RAD and mobile phone side input parameter, will generate an authenticating result as the resident authentication arithmetic 111 of mobile phone itself.
Authenticating result 106 RESULTstephi, 107RESULTfeal32 that mobile phone side authenticating result 110 will be calculated with system side deliver to together on 108 base station controllers and compare.If 110 is identical with 106, think that then this mobile phone adopts the STEPHI authentication arithmetic, is changed to 2 by 109 AuthType.If 110 is identical with 107, think that then this mobile phone adopts the FEAL32 authentication arithmetic, is changed to 1 by 109 AuthType.This is to call out for the first time, as long as wherein there is one to equate, has just thought by authentication.If all unequal, that the current calling of initiation is described is illegal user, then refuses its calling, and AuthType is constant.
Fig. 2 is after certain mobile phone identification mode is discerned, in calling out later on, and the authentication arithmetic flow chart of FEAL32:
By calling out for the first time, system has identified this user and has adopted the FEAL32 authentication arithmetic.In the calling afterwards, system at first judges AuthType=1 by 201, promptly adopts the FEAL32 authentication arithmetic.Produce 64bit random number RA D by random number generator 202, obtain authentication password 203 then in system side, random number RA D and authentication password carry out computing and obtain (205) authenticating result RESULTfeal32 as 2 input parameters of 204FEAL32 authentication arithmetic.RAD and 209 mobile phone side authentication passwords obtain authenticating result 207RESULTfeal32 through the resident 208FEAL32 authentication arithmetic of mobile phone itself.Then by 206 comparators,,, then think and passed through authentication if equal 205 and 207 comparisons of entering.If unequal, that the current calling of initiation is described is illegal user, then refuses its calling.
Fig. 3 is after certain mobile phone identification mode is discerned, in calling out later on, and the authentication arithmetic flow chart of STEPHI:
By calling out for the first time, system has identified this user and has adopted the STEPHI authentication arithmetic.In the calling afterwards, system at first judges AuthType=2 by 301, promptly adopts the STEPHI authentication arithmetic.Produce 64bit random number RA D by random number generator 302, obtain authentication password 303 then in system side, random number RA D and authentication password carry out computing and obtain (305) authenticating result RESULTstephi as 2 input parameters of 304STEPHI authentication arithmetic.RAD and 309 mobile phone side authentication passwords obtain authenticating result 307RESULTstephi through the resident 308STIPHI authentication arithmetic of mobile phone itself ".Then by 306 comparators,,, then think and passed through authentication if equal 305 and 307 comparisons of entering.If unequal, that the current calling of initiation is described is illegal user, then refuses its calling.
In sum, in the PHS system, by the calling of mobile phone, use method of the present invention, can discern and identify the authentication mode that this mobile phone adopts automatically, realize the self adaptation of mobile phone identification mode, make a PHS system can support FEAL32 simultaneously, the mobile phone of two kinds of authentication modes of STEPHI.So, adopt the present invention, can improve existing systems very easily, make and originally only support a kind of system of authentication mode can realize supporting simultaneously STEPHI and two kinds of method for authenticating of FEAL32, like this for the mobile phone that possesses FEAL32 or STEPHI algorithm that has existed in the market, need not divide mobile phone to adopt which kind of authentication mode, thereby make these two kinds of mobile phones in this system, to use in the mobile phone proparea that networks.This kind is convenient to standard market to the self adaptation and the support of mobile phone authentication mode, makes a system support the authentication of dual mode simultaneously, also is convenient to realize interconnecting of variant PHS system of equipment vendors.
Above embodiment is only unrestricted in order to explanation the present invention, although the present invention is had been described in detail with reference to above preferred embodiment, those of ordinary skill in the art is to be understood that, can make amendment, be out of shape the present invention or be equal to replacement, and not breaking away from the spirit and scope of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (2)

1, realizes two kinds of adaptive methods of mobile phone identification mode in a kind of personnel hand system, it is characterized in that: which comprises at least following steps: in the user attaching register, the authentication signature position of corresponding certain authentication arithmetic is set, is used to deposit the authentication arithmetic mark value; When the user makes a call, start two kinds of different authentication arithmetics, the random number that produces from the user attaching register with the PHS base station controller is the parameter generating plain code, relatively the random number that produces from the user attaching register with the PHS base station controller of this plain code and mobile phone itself storage authentication arithmetic is whether the authentication plain code of parameter generating is consistent, consistent person is arranged, the mark value of consistent person's correspondence is arranged on this authentication signature position; When the user calls out once more, consult the value on the authentication signature position earlier, start corresponding authentication arithmetic, the random number that produces from the user attaching register with the PHS base station controller is the parameter generating plain code, relatively the random number that produces from the user attaching register with the PHS base station controller of this plain code and mobile phone itself storage authentication arithmetic is whether the authentication plain code of parameter generating is consistent, if consistent, finish the self adaptation authentication process; Do not have consistently, illustrate that initiate current calling is illegal user, then refuses its calling.
2, realize two kinds of adaptive methods of mobile phone identification mode in the personnel hand system according to claim 1, it is characterized in that: be that the plain code that calculates is issued PHS side group station control in the described step, this controller carries out relatively plain code value of correspondence, detect authentication signature value on the user attaching register, and assignment is given the authentication signature position.
CN01131665.9A 2001-12-29 2001-12-29 Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system Expired - Fee Related CN1264370C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN01131665.9A CN1264370C (en) 2001-12-29 2001-12-29 Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN01131665.9A CN1264370C (en) 2001-12-29 2001-12-29 Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system

Publications (2)

Publication Number Publication Date
CN1430441A CN1430441A (en) 2003-07-16
CN1264370C true CN1264370C (en) 2006-07-12

Family

ID=4670774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN01131665.9A Expired - Fee Related CN1264370C (en) 2001-12-29 2001-12-29 Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system

Country Status (1)

Country Link
CN (1) CN1264370C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835436B (en) * 2005-03-14 2010-04-14 华为技术有限公司 General power authentication frame and method of realizing power auttientication
CN101001403B (en) * 2006-01-10 2010-11-24 Ut斯达康通讯有限公司 Expansing codeless conversion operation in system of personal mobile phone

Also Published As

Publication number Publication date
CN1430441A (en) 2003-07-16

Similar Documents

Publication Publication Date Title
CN1096770C (en) User authentication in a communications network
CN1243427C (en) Method for dynamically updating cellular-phone-unique-encryption key
CN1557103A (en) Apparatus, and associated method, for providing an operation parameter to a mobile station of a radio communication station
CN101076190A (en) Management of authentication keys in a mobile communication system
CN102724172A (en) System and method supporting rapid access authentication
US20040050924A1 (en) Enabling of devices
CN1115893C (en) Communication system, mobile terminal and registering method of network communicating to terminal
KR19990029103A (en) How to Switch Between PCS Authentication Methods
CN1509058A (en) Method for accessing internet for wireless mobile communication apparatus
CN1264370C (en) Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system
CN1308822A (en) Method for operational changes authorization on a mobile phone
US7650139B2 (en) Method for ensuring security of subscriber card
CN1210654A (en) Use of mobile station as cordless telephone
CN1326654A (en) Method and system for authentication
CN1288875C (en) PHS mobile phone network discriminating method
CN105188046A (en) SIM-card-free mobile phone and SIM-card-free mobile phone network registration method and device
CN100352172C (en) Method of implementing two kind hand set compatible right discrimination mode in personal hand set system
CN1162034C (en) System permitting use of mobile telephone terminal in special telecommunication network
CN1110222C (en) Method for establishing connection in mobile communication network
WO1998000956A3 (en) System and method for preventing cellular fraud
WO2000054491A8 (en) Process for screening and tracking users on a telephonic network
CN1901683B (en) Method and apparatus for processing a communication request
CN101179861A (en) Method and device for position detection
CN1124766C (en) System and method for preventing replay attacks in wireless communication
CN1196647A (en) Telecommunication system control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: SHENZHENG CITY ZTE CO., LTD.

Free format text: FORMER OWNER: SHENZHENG CITY ZTE CO., LTD. SHANGHAI SECOND INSTITUTE

Effective date: 20030724

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20030724

Applicant after: Zhongxing Communication Co., Ltd., Shenzhen City

Applicant before: Shanghai Inst. of No.2, Zhongxing Communication Co., Ltd., Shenzhen City

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Shenzhen ZTE Mobile Tech Co., Ltd.

Assignor: ZTE Corporation

Contract fulfillment period: 2007.11.6 to 2013.11.6

Contract record no.: 2008990000835

Denomination of invention: Adaptive method for realizing two kinds of hand set discrimination mode in personal hand-held system

Granted publication date: 20060712

License type: Exclusive license

Record date: 20081020

LIC Patent licence contract for exploitation submitted for record

Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2007.11.6 TO 2013.11.6; CHANGE OF CONTRACT

Name of requester: SHENZHEN CITY ZHONGXING MOBILE COMMUNICATION CO.,

Effective date: 20081020

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060712

Termination date: 20171229