CN1564524A - Method of radio terminal charging fee in radio LAN - Google Patents

Method of radio terminal charging fee in radio LAN Download PDF

Info

Publication number
CN1564524A
CN1564524A CN 200410029788 CN200410029788A CN1564524A CN 1564524 A CN1564524 A CN 1564524A CN 200410029788 CN200410029788 CN 200410029788 CN 200410029788 A CN200410029788 A CN 200410029788A CN 1564524 A CN1564524 A CN 1564524A
Authority
CN
China
Prior art keywords
sta
certificate
message
production line
rolls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410029788
Other languages
Chinese (zh)
Inventor
刘小刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN 200410029788 priority Critical patent/CN1564524A/en
Publication of CN1564524A publication Critical patent/CN1564524A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The method includes following procedures: in safe access session procedure specified in WAI, after AP receives response of certificate authentication (CA) returned from ASU, if result of STA in information of CA result is successful, then AP records name of holder in STA certificate; in procedure of negotiating about cipher key between AP and STA, if AP determines the said negotiation is successful, then the said name of holder is as id of charged user; charging message of starting up is sent to charging server; when session is ended, STA sends drop note to AP, which validates the note and sends message of stopping charging to charging server if validation is passed. The method is compatible to current program and protocols.

Description

The method of wireless terminal charging in a kind of WLAN (wireless local area network)
Technical field
The present invention relates to a kind of be applied to WLAN (wireless local area network) to wireless terminal (STA) charging method.Specifically, the present invention relates to a kind of WLAN (WLAN (wireless local area network)) conversation procedure that charges based on the band of GB WAPI (WLAN Authentication and Privacy Infrastructure, WAPI).
Background technology
In May, 2003, national wide-band wireless IP working group has issued WLAN standard GB 15629.11.Defined GB WLAN authentication and privacy infrastructure (WAPI) at GB the 8th chapter.
WAPI mainly comprises wireless local area network authentication infrastructure (WAI) and wireless local area network security foundation structure (WPI) two parts content.Wherein WAI mechanism has realized two-way authentication between STA and the wireless network by the elliptic curve cipher certificate, and adopts two message of public key encryption to realize session key agreement.A STA safety access process authentication that defines in WAPI comprises certificate discriminating and key agreement two parts.The safe access process of WLAN standard GB 15629.11 regulations is as follows:
1. differentiate and activate.Related or when being associated to AP again as STA, send to STA by AP and to differentiate and activate to start whole discrimination process.
2. insert the request of discriminating.STA sends access to AP and differentiates request, and the current system time that is about to STA certificate and STA mails to AP, and wherein system time is called access discriminating request time.
3. request of certificate authentication.AP at first writes down and differentiates request time after receiving that STA access discriminating is asked, and sends request of certificate authentication to ASU then, and soon the private key of STA certificate, access discriminating request time, AP certificate and AP sends to ASU to their signature formation request of certificate authentication.
4. certificate is differentiated response.ASU receive the certificate of AP sign do not invite ask after, the signature of checking AP and the validity of AP certificate, if incorrect, then discrimination process failure, otherwise further verify the STA certificate.After verifying, STA certificate identification result information (comprising STA certificate and identification result), AP certificate are signed other object information (comprise AP certificate and identification result and insert the discriminating request time) to ASU and ASU differentiates that to their signature formation certificate response sends back to AP.
5. insert and differentiate response.The certificate that AP returns ASU is signed to hold your noise and should be carried out signature verification, obtains the identification result of STA certificate, according to this result STA is carried out access control.AP signs the certificate of receiving to hold your noise and should be recycled to STA.Behind the signature of STA checking ASU, obtain the identification result of AP certificate, whether insert this AP according to this identification result decision.
6. key negotiation request.AP produces a string random data, utilize the public key encryption of STA after, send key negotiation request to STA.This request comprises all alternate session algorithm informations of requesting party.
7. key negotiation response.After STA receives the key negotiation request that AP sends, at first carry out the session negotiating algorithm, if response side does not support all alternate session algorithms of requesting party,, otherwise in the alternative algorithm that the requesting party provides, select a kind of algorithm of oneself supporting then to the failure of requesting party's response session negotiating algorithm; Utilize local private key deciphering negotiation data again, obtain the random data that AP produces; Produce a string random data then, utilize the public key encryption of AP after, send to AP again.
When carrying out other application of carrier-class based on the WLAN (wireless local area network) of GB WAPI, as the airport, the hot spot application in hotel is chargeed and can not be ignored as a critical function.And at how supporting to charge do not design among the WAPI.
Present wireless local area network charging method normally adopts the Radius agreement to charge.Carry a unique user ID in the Radius protocol requirement charging message, charge so that search user profile at accounting server.
Behind the STA authentication success, AP sends to charge to accounting server and begins request, in charging message, need carry a unique user ID, to determine the charge information at the user.This user ID is provided in verification process by STA.In the safe access procedure (comprise inserting and differentiate and key agreement) of GB WAPI definition, there is not the process of determining user ID.The accuracy of chargeing need stop to guarantee that this point also is that GB WAPI is short of by charge beginning and charging.The safe access procedure of GB WAPI definition is the beginning part of a STA and AP conversation procedure, does not define STA and how to roll off the production line.The beginning of chargeing can be sent to accounting server by AP after access is differentiated successfully, and owing to lack line process under the STA, AP can't determine when and stop to charge.
Summary of the invention
The WLAN (wireless local area network) that the present invention is directed to based on GB WAPI is applied under public's wireless network scenario, and the problem that can not charge has designed the charging method based on WAPI, and summary of the invention is as follows:
Safety in the WAI regulation inserts in the conversation procedure:
1.AP after receiving that certificate that ASU returns is differentiated response, if the STA object code in the certificate identification result information be " 0 ", promptly represent authentication success, AP writes down the certificate holder title in the STA certificate;
2.AP carry out in the cipher key agreement process with STA, if AP judges the key agreement failure, the key agreement failure is not then chargeed; If AP judges the key agreement success, then be referred to as the user's fee sign with the certificate holder name in the described STA certificate of prior buffer memory, send the beginning message that charges to accounting server;
3. when conversation end, STA sends the notice that rolls off the production line to AP, after AP receives, verifies the notice message that rolls off the production line; After checking is passed through, send charging to accounting server and stop message; Otherwise, abandon this notice message that rolls off the production line;
4.STA during abnormal off-line, AP should set by rational time-out time, is referred to as the user's fee sign according to the certificate holder name in the certificate, sends to accounting server to stop charging message.
The invention solves the charging problem under the scene that ought be applied to public network based on the WLAN of national standard WAPI, and can be well compatible with existing account software and agreement.
Description of drawings
Fig. 1 is the access procedure flow chart that once complete band of the present invention charges;
Fig. 2 is the packet basic format schematic diagram of the WAI in the GB;
Fig. 3 is the notice message data paragraph format schematic diagram that rolls off the production line.
Embodiment
As shown in Figure 1, the conversation procedure that charges for once complete band.Conversation procedure is as follows:
1. related or when being associated to AP again as STA, send to STA by AP and to differentiate and activate to start whole discrimination process.
Differentiate request 2.STA send access to AP, the current system time that is about to STA certificate and STA mails to AP, and wherein system time is called access discriminating request time.
3.AP after receiving that STA access discriminating is asked, at first write down and differentiate request time, send request of certificate authentication to ASU then, soon the private key of STA certificate, access discriminating request time, AP certificate and AP sends to ASU to their signature formation request of certificate authentication.
4.ASU receive the certificate of AP sign do not invite ask after, the signature of checking AP and the validity of AP certificate, if incorrect, then discrimination process failure, otherwise further verify the STA certificate.After verifying, STA certificate identification result information (comprising STA certificate and identification result), AP certificate are signed other object information (comprise AP certificate and identification result and insert the discriminating request time) to ASU and ASU differentiates that to their signature formation certificate response sends back to AP.
5. insert and differentiate response.The certificate that AP returns ASU is signed to hold your noise and should be carried out signature verification, obtain the identification result of STA certificate, STA carried out access control, if the STA object code in the certificate identification result information is according to this result " 0 ", promptly represent authentication success, then write down the certificate holder title in the STA certificate.AP signs the certificate of receiving to hold your noise and should be recycled to STA.Behind the signature of STA checking ASU, obtain the identification result of AP certificate, whether insert this AP according to this identification result decision.
6.AP and STA carries out key agreement.If the key agreement success, AP is referred to as the user's fee sign with the certificate holder name in the certificate, sends the beginning message that charges to accounting server.
7. in conversation procedure, AP sends charging message according to time or flow to accounting server.When user's abnormal off-line, AP should send to accounting server according to certain timeout mechanism and stop charging message.
8. when conversation end, STA sends the notice message that rolls off the production line to AP, and after AP received, checking was rolled off the production line and notified the session identification of message.After checking is passed through, to accounting server transmission stopping charging message.Otherwise, abandon this notice message that rolls off the production line.
The roll off the production line Notification Format corresponding with above-mentioned conversation procedure:
In the packet basic format of WAI in GB, add the notice type of message that rolls off the production line, promptly differentiated packet type field as shown in Figure 2.
The discriminating packet type field is defined as:
" 5 " expression notice type of message number that rolls off the production line.
Fig. 3 is the data segment content of the notice that rolls off the production line in the packet basic format of WAI.The notice that rolls off the production line is that STA is used for notifying AP, and STA will finish a WAPI session, and AP can disconnect the connection of STA according to the notice that rolls off the production line, and stops charging process.

Claims (3)

1. the method for wireless terminal charging in the WLAN (wireless local area network) is characterized in that described method comprises following treatment step:
1) safety in WAI regulation inserts in the conversation procedure, and after AP received that certificate that ASU returns is differentiated response, if the STA result in the certificate identification result information be an authentication success, AP write down the certificate holder title in the STA certificate;
2) AP and STA carry out in the cipher key agreement process, if AP judges the key agreement success, then are referred to as the user's fee sign with the certificate holder name in the described STA certificate of prior buffer memory, send the beginning message that charges to accounting server;
3) when conversation end, STA sends the notice that rolls off the production line to AP, after AP receives, verifies the notice message that rolls off the production line; After checking was passed through, AP sent to charge to accounting server and stops message; Otherwise, abandon this notice message that rolls off the production line.
2. the method for wireless terminal charging is characterized in that in the WLAN (wireless local area network) according to claim 1, and the notice that rolls off the production line in described step 3) message comprises session identification, and after AP received message, checking was rolled off the production line and notified the session identification of message.
3. the method for wireless terminal charging in the WLAN (wireless local area network) according to claim 1 and 2, it is characterized in that, when the STA abnormal off-line, AP sets by rational time-out time, be referred to as the user's fee sign according to the certificate holder name in the certificate, AP sends to accounting server and stops charging message.
CN 200410029788 2004-03-26 2004-03-26 Method of radio terminal charging fee in radio LAN Pending CN1564524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410029788 CN1564524A (en) 2004-03-26 2004-03-26 Method of radio terminal charging fee in radio LAN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410029788 CN1564524A (en) 2004-03-26 2004-03-26 Method of radio terminal charging fee in radio LAN

Publications (1)

Publication Number Publication Date
CN1564524A true CN1564524A (en) 2005-01-12

Family

ID=34480999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410029788 Pending CN1564524A (en) 2004-03-26 2004-03-26 Method of radio terminal charging fee in radio LAN

Country Status (1)

Country Link
CN (1) CN1564524A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100358282C (en) * 2005-03-23 2007-12-26 西安电子科技大学 Key agreement method in WAPI authentication mechanism
WO2008080351A1 (en) * 2006-12-29 2008-07-10 China Iwncomm Co., Ltd. Wireless local network operation method based on wapi
WO2008080352A1 (en) * 2006-12-29 2008-07-10 China Mobile Group Design Institute Co., Ltd. A wlan authentication charging method based on wapi
CN1913435B (en) * 2005-08-11 2010-09-01 索尼株式会社 Wireless communication system, terminal and status report method
WO2010102496A1 (en) * 2009-03-11 2010-09-16 西安西电捷通无线网络通信股份有限公司 Method for implementing zero-interference charging at wapi system terminal
CN101286858B (en) * 2007-04-12 2010-12-08 中兴通讯股份有限公司 Method and system for charging of WAP gateway for mobile terminal
CN101527908B (en) * 2009-04-08 2011-04-20 中兴通讯股份有限公司 Method for pre-identifying wireless local area network terminal and wireless local area network system
CN101425909B (en) * 2008-09-28 2011-06-01 西安西电捷通无线网络通信股份有限公司 Method for implementing WAPI system terminal zero interference charging
CN102833746A (en) * 2012-09-14 2012-12-19 福建星网锐捷网络有限公司 User re-authentication method and AC (Access Controller)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100358282C (en) * 2005-03-23 2007-12-26 西安电子科技大学 Key agreement method in WAPI authentication mechanism
CN1913435B (en) * 2005-08-11 2010-09-01 索尼株式会社 Wireless communication system, terminal and status report method
WO2008080351A1 (en) * 2006-12-29 2008-07-10 China Iwncomm Co., Ltd. Wireless local network operation method based on wapi
WO2008080352A1 (en) * 2006-12-29 2008-07-10 China Mobile Group Design Institute Co., Ltd. A wlan authentication charging method based on wapi
CN100448196C (en) * 2006-12-29 2008-12-31 西安西电捷通无线网络通信有限公司 WAPI-based wireless LAN operation method
CN101286858B (en) * 2007-04-12 2010-12-08 中兴通讯股份有限公司 Method and system for charging of WAP gateway for mobile terminal
CN101425909B (en) * 2008-09-28 2011-06-01 西安西电捷通无线网络通信股份有限公司 Method for implementing WAPI system terminal zero interference charging
WO2010102496A1 (en) * 2009-03-11 2010-09-16 西安西电捷通无线网络通信股份有限公司 Method for implementing zero-interference charging at wapi system terminal
CN101527908B (en) * 2009-04-08 2011-04-20 中兴通讯股份有限公司 Method for pre-identifying wireless local area network terminal and wireless local area network system
CN102833746A (en) * 2012-09-14 2012-12-19 福建星网锐捷网络有限公司 User re-authentication method and AC (Access Controller)
CN102833746B (en) * 2012-09-14 2015-11-25 福建星网锐捷网络有限公司 User's re-authentication method and access controller

Similar Documents

Publication Publication Date Title
CN101212297B (en) WEB-based WLAN access authentication method and system
JP4272920B2 (en) Method and apparatus for checking the validity of a first communication participant in a communication network
US20050154909A1 (en) Certificate based authentication authorization accounting scheme for loose coupling interworking
KR20140005306A (en) Continuous voice authentication for a mobile device
CN103167497B (en) A kind of authentication processing method and authentication process system
CN1564509A (en) Key consaltation method in radio LAN
CN1564524A (en) Method of radio terminal charging fee in radio LAN
US9161217B2 (en) Method and system for authenticating in a communication system
WO2011009268A1 (en) Wapi (wlan authentication and privacy infrastructure) -based authentication system and method
CN100544253C (en) The safe re-authentication method of mobile terminal of wireless local area network
CN101969639B (en) Multi-certificate and multi-certification mode combined access authentication method and system
CN102264050A (en) Network access method, system and authentication server
CN101425909B (en) Method for implementing WAPI system terminal zero interference charging
CN101282215A (en) Method and apparatus for distinguishing certificate
CN101540985B (en) Method for implementing terminal zero intervention charging of WAPI system
CN111884812B (en) Binding method and system of hardware equipment
CN100459536C (en) Method and network for WLAN session control
CN1299526C (en) A method of wireless local area network terminal user authentication based on user identifying module
CN1564516A (en) Allopatic access authentication method of mobile terminal of radio LAN
CN101860865A (en) Method and device for realizing secondary access
CN1213565C (en) Method of real time modifying business during realizing identifying authorized charge procedure
CN114615309A (en) Client access control method, device and system, electronic equipment and storage medium
CN1567859A (en) A method of access authentication for WLAN
CN102131199B (en) WAPI (Wlan Authentication and Privacy Infrastructure) authentication method and access point
JP4592850B2 (en) Authentication method in mobile radio communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication