JPH0759154A - Inter-network authentication key generating method - Google Patents

Inter-network authentication key generating method

Info

Publication number
JPH0759154A
JPH0759154A JP5200932A JP20093293A JPH0759154A JP H0759154 A JPH0759154 A JP H0759154A JP 5200932 A JP5200932 A JP 5200932A JP 20093293 A JP20093293 A JP 20093293A JP H0759154 A JPH0759154 A JP H0759154A
Authority
JP
Japan
Prior art keywords
network
inter
authentication key
random number
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP5200932A
Other languages
Japanese (ja)
Inventor
Yasuo Maruyama
康夫 丸山
Masami Yabusaki
正実 薮崎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP5200932A priority Critical patent/JPH0759154A/en
Publication of JPH0759154A publication Critical patent/JPH0759154A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To attain the authentication of a terminal equipment in a roaming destination network by enhancing the security and decreasing the quantity of inter-network signals. CONSTITUTION:Upon the receipt of a service request from a terminal equipment 3 by a roaming destination network 2, the roaming destination network 2 requests a verification key to a home network 1 of the terminal equipment 3. The home network 1 generates a random number (p), an authentication key K13 is generated through ciphering operation by using the (p) and a key K3 specific to the terminal equipment 3 and the key K13 and the random number (p) are returned to the roaming destination network 2. The roaming destination network 2 stores the key K13 and generates a random number (q) and generates a ciphering text C(q) by using the (q) and the K13 and the random numbers p, q are sent to the terminal equipment 3. The terminal equipment 3 uses the specific key K3 and the random number (p) stored therein and generates the authentication key K13 through ciphering operation and the key is stored and a ciphering text C(q) is generated through ciphering operation by using the K13 and the number (q) and returned to the roaming destination network 2. The network 2 compares the received C(q) with the C(q) generated precedingly and discriminates the terminal equipment 3 to be a legal terminal equipment when they are coincident.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】この発明は端末や加入者が移動し
て自身のホーム網とは異なる網からサービスを享受する
ことを可能とする移動通信やパーソナル通信システムに
おいて、ホーム網と異なる網で他の網から移動して来た
端末や加入者を認証するために用いる網間認証鍵を生成
する方法に関する。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a mobile communication or personal communication system that enables terminals and subscribers to move and enjoy services from a network different from their own home network. The present invention relates to a method for generating an inter-network authentication key used for authenticating a terminal or a subscriber moving from another network.

【0002】[0002]

【従来の技術】例えば図3に示すように移動通信網1,
2があり、網1に加入している移動端末(加入者)3が
網2へ移動し、その網2(ローミング先網)からサービ
スを受けることを網2にその基地局を通じて要求する
と、網2はその端末3の認証を行うために、例えば前記
基地局に接続された交換局から、端末3が加入している
網1(ホーム網)にそこに記憶されている端末3の認証
鍵K3 の転送を要求し、認証鍵K3 を受取り、鍵記憶装
置5(図4A)に記憶する。その交換局で乱数発生装置
4から乱数pを生成して端末3へ送信する。この乱数p
を受信した端末3は鍵記憶装置6(図4B)内のその端
末に割り当てられた認証鍵K3 と受信し乱数Pとを用い
て暗号化装置7で暗号化演算をして暗号文C(p)を作
って前記交換局へ返送する。
2. Description of the Related Art For example, as shown in FIG.
2 and a mobile terminal (subscriber) 3 subscribed to the network 1 moves to the network 2 and requests the network 2 (roaming destination network) to receive service from the network 2 through the base station, In order to authenticate the terminal 3, the authentication key K of the terminal 3 stored in the network 1 (home network) to which the terminal 3 subscribes, for example, from the exchange connected to the base station. 3 is requested, the authentication key K 3 is received, and stored in the key storage device 5 (FIG. 4A). The exchange generates a random number p from the random number generator 4 and sends it to the terminal 3. This random number p
The terminal 3 which has received the key received the authentication key K 3 assigned to the terminal in the key storage device 6 (FIG. 4B) and the random number P and performs an encryption operation by the encryption device 7 to generate a ciphertext C ( p) and send it back to the exchange.

【0003】この交換局においても生成した乱数pと受
信した認証鍵K3 とを用いて暗号化装置8(図4A)で
暗号化演算をして暗号文C(p)を作り、これと端末3
から受信した暗号文C(p)とを比較し、両者が一致し
た場合はその端末3を正当な端末と判断し、一致しなけ
れば、不正な端末と判断する。以上の手順を図5に示
す。
This exchange also uses the generated random number p and the received authentication key K 3 to perform an encryption operation in the encryption device 8 (FIG. 4A) to create a ciphertext C (p), which is used by the terminal and the terminal. Three
The ciphertext C (p) received from is compared with each other. If they match, the terminal 3 is determined to be a valid terminal, and if they do not match, it is determined to be an unauthorized terminal. The above procedure is shown in FIG.

【0004】[0004]

【発明が解決しようとする課題】以上述べたように、従
来の方式では端末の認証鍵自身をホーム網からローミン
グ先網に転送する方法をとっているから、何らかの手段
で転送中の認証鍵が第三者に知れると、その認証鍵を含
んだ不正な端末が製造され、しかもその不正端末を網が
検出できないという問題がある。また、上記の問題を避
けるために、ローミング中の端末についてもその端末の
ホーム網で認証を行う方法が考えられるが、この方法で
は網間の信号数の増大を招くという問題がある。
As described above, since the conventional method adopts a method of transferring the terminal authentication key itself from the home network to the roaming destination network, the authentication key being transferred may be changed by some means. If known to a third party, there is a problem that an unauthorized terminal including the authentication key is manufactured, and the network cannot detect the unauthorized terminal. In order to avoid the above problem, a method of authenticating a roaming terminal in the home network of the terminal can be considered, but this method has a problem of increasing the number of signals between networks.

【0005】この発明は、ローミング先の網内に閉じて
認証処理を遂行することを可能にし、しかし認証鍵が第
三者に知られるおそれがなく、また網間の信号数が増大
しないことを可能とする網間認証鍵生成方法を提供する
ことを目的とする。
The present invention makes it possible to perform the authentication process by closing the roaming destination network, but the authentication key is not known to a third party, and the number of signals between networks does not increase. It is an object to provide an inter-network authentication key generation method that enables it.

【0006】[0006]

【課題を解決するための手段】請求項1の発明によれば
ローミング先網が移動端末からサービス要求を受けると
その移動端末のホーム網に網間認証鍵を要求する。その
ホーム網は網間認証鍵の要求を受けると、乱数を生成
し、その乱数と移動端末の個有鍵とを用いて暗号演算を
行って網間認証鍵を生成し、この網間認証鍵と前記乱数
とを前記ローミング先網へ返送する。このローミング先
網は返送されたその網間認証鍵を保持し、返送された乱
数をサービス要求した移動端末へ送る。移動端末はその
乱数を受けると、この乱数と自己が保持している個有鍵
とを用いて暗号演算を行って網間認証鍵を生成し、これ
を保持する。
According to the invention of claim 1, when the roaming destination network receives a service request from the mobile terminal, the inter-network authentication key is requested to the home network of the mobile terminal. When the home network receives a request for an inter-network authentication key, it generates a random number, performs cryptographic operation using the random number and the private key of the mobile terminal to generate the inter-network authentication key, and the inter-network authentication key is generated. And the random number are returned to the roaming destination network. The roaming destination network holds the returned inter-network authentication key, and sends the returned random number to the mobile terminal that requested the service. When the mobile terminal receives the random number, it performs a cryptographic operation using this random number and the private key held by itself to generate an inter-network authentication key, and holds it.

【0007】このようにして得られた網間認証鍵を用い
て端末認証を行う。つまりローミング先網はサービス要
求のあった移動端末に対する認証を、従来と同様に乱数
を発生させ、これを移動端末へ送り、移動端末ではその
乱数と網間認証鍵とを用いて暗号文を作ってローミング
先網へ返送し、ローミング先網で網間認証鍵と乱数とで
暗号文を作り、これと受け取った暗号文とを比較する。
Terminal authentication is performed using the inter-network authentication key obtained in this way. In other words, the roaming destination network generates a random number in the same way as in the conventional method for authenticating the mobile terminal that requested the service, sends it to the mobile terminal, and the mobile terminal uses the random number and the inter-network authentication key to create a ciphertext. Then, the roaming destination network sends the encrypted text back to the roaming destination network, and the roaming destination network creates a ciphertext using the inter-network authentication key and a random number.

【0008】請求項2の発明によれば、網のサービスを
受けるために加入者番号などを記憶したICカードを用
いるようにし、加入者に個有な個有鍵をその加入者のI
Cカードに保持させると共に、その加入者のホーム網に
各加入者の上記個有鍵を保持させ、ローミング先網が加
入者からサービス要求を受けるとその加入者のホーム網
に網間認証鍵を要求する。そのホーム網は網間認証鍵の
要求を受けると、乱数を生成し、その乱数とその加入者
の個有鍵とを用いて暗号演算を行って網間認証鍵を生成
し、この網間認証鍵と、前記乱数とを前記ローミング先
網へ返送する。このローミング先網はその返送された網
間認証鍵を保持し、返送された乱数をサービス要求した
加入者のICカードへ送る。その加入者のICカードは
その乱数を受けると、この乱数と自己が保持している個
有鍵とを用いて暗号演算を行って網間認証鍵を生成し、
これを保持する。
According to the second aspect of the present invention, an IC card storing a subscriber number or the like is used to receive the service of the network, and the unique key unique to the subscriber is used as the I key of the subscriber.
The C card holds the subscriber's home network with the above-mentioned private key of each subscriber, and when the roaming destination network receives a service request from the subscriber, the inter-network authentication key is sent to the subscriber's home network. Request. When the home network receives a request for an inter-network authentication key, it generates a random number and performs a cryptographic operation using the random number and the subscriber's private key to generate the inter-network authentication key. The key and the random number are returned to the roaming destination network. The roaming destination network holds the returned inter-network authentication key, and sends the returned random number to the IC card of the subscriber who requested the service. When the IC card of the subscriber receives the random number, the IC card of the subscriber performs an encryption operation using the random number and the unique key held by itself to generate an inter-network authentication key,
Hold this.

【0009】このようにして得られた網間認証鍵を用い
て加入者認証を前記移動端末に対して行った場合と同様
にして行う。
The subscriber authentication is performed in the same manner as in the case where the mobile terminal is authenticated using the inter-network authentication key obtained in this way.

【0010】[0010]

【実施例】図1及び2を参照して請求項1の発明の実施
例を説明する。図1Aは網内の例えば交換局に設けられ
た網間認証鍵生成装置を示し、図1Bは移動端末中の網
間認証鍵生成装置を示し、それぞれ図4A,4Bと対応
する部分に同一符号を付けてある。網に設けられる網間
認証鍵生成装置には乱数発生装置4で発生した乱数と、
ローミング先網を通じて端末へ送信する乱数送信装置1
2が付加され、端末の網間認証鍵生成装置には生成した
網間認証鍵を記憶する出力記憶装置13が付加されてい
る。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS An embodiment of the invention of claim 1 will be described with reference to FIGS. FIG. 1A shows an inter-network authentication key generation device provided in, for example, a switching center in the network, and FIG. 1B shows an inter-network authentication key generation device in a mobile terminal. Is attached. In the inter-network authentication key generation device provided in the network, the random number generated by the random number generation device 4
Random number transmission device 1 for transmitting to the terminal through the roaming destination network
2 is added, and an output storage device 13 for storing the generated inter-network authentication key is added to the inter-network authentication key generation device of the terminal.

【0011】各端末3に個有な個有鍵K3 がホーム網1
の鍵記憶装置5と、端末3の鍵記憶装置6とにそれぞれ
記憶されてある。鍵記憶装置5は例えば各端末(加入
者)ごとに加入者データを記憶しているホームメモリに
その端末対応で記憶しておく。網1をホーム網とする端
末3が網2へ移動し、このローミング先網2に対し端末
3がサービス要求をした場合の網間認証鍵生成方法を図
2の処理手順を参照して説明する。
The unique key K 3 unique to each terminal 3 is the home network 1
Are stored in the key storage device 5 and the key storage device 6 of the terminal 3, respectively. The key storage device 5 is stored in the home memory, which stores subscriber data for each terminal (subscriber), corresponding to the terminal. A method of generating an inter-network authentication key when a terminal 3 having the network 1 as a home network moves to the network 2 and the terminal 3 makes a service request to the roaming destination network 2 will be described with reference to the processing procedure of FIG. .

【0012】ローミング先網2の例えば交換局が基地局
を介して端末3からサービス要求を受けると、その交換
局はその端末3の端末番号から端末3のホーム網を知
り、ホーム網1へ端末3の番号と共に網間認証鍵要求信
号を送る。これを受けたホーム網1はその端末3の端末
番号から端末3の個有鍵K3 を鍵記憶装置5から読出
し、また乱数発生装置4で乱数pを発生し、この乱数と
個有鍵K3 とを用いて暗号演算を暗号化装置8で行って
網間認証鍵Ki3を生成する。この網間認証鍵Ki3と前記
乱数pとをローミング先網2へ端末番号と共に返送す
る。
When, for example, a switching center of the roaming destination network 2 receives a service request from the terminal 3 via the base station, the switching center knows the home network of the terminal 3 from the terminal number of the terminal 3 and sends it to the home network 1. An inter-network authentication key request signal is sent together with the number 3. Receiving this, the home network 1 reads the unique key K 3 of the terminal 3 from the key number of the terminal 3 from the key storage device 5, and the random number generator 4 generates a random number p. The encryption operation is performed by the encryption device 8 using 3 and 3, and the inter-network authentication key K i3 is generated. The network authentication key K i3 and the random number p are returned to the roaming destination network 2 together with the terminal number.

【0013】ローミング先網2の前記交換局では、受取
った網間認証鍵にKi3を他網送出データ記憶装置9内に
記憶しておき、受取った乱数pと、自網の乱数発生装置
4で発生した乱数qとを端末3へ送る。両乱数を受取っ
た端末3は、乱数pと自己が鍵記憶装置6に保持してい
る個有鍵K3 とを用いて暗号化装置7で暗号演算を行っ
て網間認証鍵Ki3を生成し、これを出力記憶装置13に
記憶する。このようにして端末3を認証するための網間
認証鍵Ki3が得られた。この後の認証手順は従来と同様
である。
In the exchange of the roaming destination network 2, K i3 is stored in the other network transmission data storage device 9 as the received inter-network authentication key, and the received random number p and the random number generation device 4 of the own network are stored. The random number q generated in step 1 is sent to the terminal 3. The terminal 3 that has received both random numbers uses the random number p and the unique key K 3 that it holds in the key storage device 6 to perform an encryption operation in the encryption device 7 to generate an inter-network authentication key K i3 . Then, this is stored in the output storage device 13. In this way, the inter-network authentication key K i3 for authenticating the terminal 3 was obtained. The subsequent authentication procedure is the same as the conventional one.

【0014】つまり端末3で網間認証鍵Ki3と乱数qと
で暗号化装置7で暗号演算を行って暗号文C(q)を作
り、これをローミング先網2へ送る。ローミング先網2
の交換局では先に発生した乱数qとホーム網1から受取
った網間認証鍵Ki3とを用いて暗号化装置8で暗号演算
を行って暗号文C(q)を生成し、この暗号文と端末3
から受取った暗号文C(q)と比較して端末3が正当な
ものか否かを判定する。
That is, in the terminal 3, the encryption device 7 performs a cryptographic operation using the inter-network authentication key K i3 and the random number q to create a ciphertext C (q), which is sent to the roaming destination network 2. Roaming destination network 2
In the exchange, the encryption device 8 performs a cryptographic operation using the previously generated random number q and the inter-network authentication key K i3 received from the home network 1 to generate a cryptogram C (q). And terminal 3
It is determined whether or not the terminal 3 is valid by comparing with the ciphertext C (q) received from.

【0015】上述ではこの発明を移動通信に適用したが
パーソナル通信に適用することもできる。つまり請求項
2の発明では、加入者は自己の加入者番号などを記憶し
たICカードを、例えば、網内の固定端末に装着するこ
とにより、その網のサービスを受け、またその端末を着
信端末とするための着信登録を行うようにする。加入者
のICカードにはその加入者に個有な個有鍵を保持さ
せ、またその個有鍵をホーム網に保持させる。加入者が
ホーム網とは別の網(ローミング先網)へ移動して、そ
の網からサービスを受けるためにその網の端末にICカ
ードを装着させると、その端末が接続された交換局はそ
の加入者のホーム網へ網間認証鍵を要求する。そのホー
ム網では網間認証鍵の要求を受けると、乱数を生成し、
これと、その加入者の個有鍵とを用いて暗号演算を行っ
て網間認証鍵を生成し、この網間認証鍵と前記乱数と
を、前記ローミング網の交換局へ送る。その交換局は受
取った網間認証鍵を保持すると共に受取った乱数を前記
加入者のICカードへ送る。そのICカードは受取った
乱数と、保持している個有鍵とを用いて暗号演算を行っ
て網間認証鍵を生成して保持する。ICカードの網間認
証鍵と、ローミング先網に保持した網間認証鍵とを用い
て、加入者に対する認証を行う方法は、先に移動端末に
対する方法と同様に行う。
Although the present invention has been applied to mobile communication in the above description, it can also be applied to personal communication. That is, according to the invention of claim 2, the subscriber receives the service of the network by mounting the IC card storing his / her subscriber number or the like on a fixed terminal in the network, and the terminal receives the service. Incoming call registration for The IC card of the subscriber holds the private key unique to the subscriber, and holds the private key in the home network. When a subscriber moves to a network different from the home network (roaming destination network) and inserts an IC card into a terminal of the network to receive a service from the network, the exchange to which the terminal is connected receives the IC card. Request an inter-network authentication key from the subscriber's home network. When the home network receives a request for an inter-network authentication key, it generates a random number,
A cryptographic calculation is performed using this and the subscriber's private key to generate an inter-network authentication key, and the inter-network authentication key and the random number are sent to the exchange of the roaming network. The exchange holds the received network authentication key and sends the received random number to the IC card of the subscriber. The IC card performs a cryptographic operation using the received random number and the retained private key to generate and retain the inter-network authentication key. The method of authenticating the subscriber using the inter-network authentication key of the IC card and the inter-network authentication key held in the roaming destination network is the same as the method for the mobile terminal first.

【0016】[0016]

【発明の効果】以上述べたようにこの発明によれば端末
に個有に割り当てた鍵をそのままローミング先網へ転送
することなく、認証の必要が生じると、その個有鍵と乱
数とで作った網間認証鍵をローミング先網への送り、ま
たその乱数を端末へローミング先網を介して送り、端末
で網間認証鍵を生成し、この網間認証鍵を用いて端末の
認証を行うため、網内のセキュリティが向上する。
As described above, according to the present invention, when authentication is required without directly transferring the key uniquely assigned to the terminal to the roaming destination network, the key is generated from the unique key and a random number. The inter-network authentication key is sent to the roaming destination network, and the random number is sent to the terminal through the roaming destination network, the terminal generates the inter-network authentication key, and the inter-network authentication key is used to authenticate the terminal. Therefore, security in the network is improved.

【0017】また一度、網間認証鍵が設定されると、以
後にそのローミング先網内で閉じて、つまりホーム網に
対し照合することなく認証処理を実施することができ、
認証ごとにホーム網へアクセスする必要がなく、網間の
信号量を低減させることができる。
Once the inter-network authentication key is set, the roaming destination network can be closed thereafter, that is, the authentication process can be performed without collating with the home network.
Since it is not necessary to access the home network for each authentication, the amount of signals between networks can be reduced.

【図面の簡単な説明】[Brief description of drawings]

【図1】Aは網内の網間認証鍵生成装置を示すブロック
図、Bは端末内の網間認証鍵生成装置を示すブロック図
である。
FIG. 1 is a block diagram showing an inter-network authentication key generating apparatus in a network, and B is a block diagram showing an inter-network authentication key generating apparatus in a terminal.

【図2】この発明の実施例の処理手順を示す図。FIG. 2 is a diagram showing a processing procedure of an embodiment of the present invention.

【図3】ホーム網から端末が別の網(ローミング先網)
へ移動してサービスを受ける様子を示す図。
FIG. 3 is a network in which the terminal is different from the home network (roaming destination network)
A diagram showing how to move to and receive services.

【図4】Aは従来の端末認証に用いる網側装置を示すブ
ロック図、Bは端末側装置を示すブロック図である。
FIG. 4 is a block diagram showing a network side device used for conventional terminal authentication, and B is a block diagram showing a terminal side device.

【図5】従来の端末認証方法の処理手順を示す図。FIG. 5 is a diagram showing a processing procedure of a conventional terminal authentication method.

Claims (2)

【特許請求の範囲】[Claims] 【請求項1】 移動端末が加入している網(ホーム網)
から別の網に移動し、その網のサービスを受けるため
に、その移動先網が上記移動端末の認証を行うために用
いる網間認証鍵を生成する方法であって、 移動端末に個有な個有鍵をその移動端末とホーム網とに
それぞれ保持させておき、 上記移動端末から上記別の網にサービス要求を受ける
と、その別の網は上記移動端末のホーム網に網間認証鍵
を要求し、 上記ホーム網は網間認証鍵の要求を受けると、乱数を生
成し、その乱数と上記移動端末の個有鍵とを用いて暗号
演算を行って網間認証鍵を生成し、 この網間認証鍵と上記乱数とを上記別の網へ送り、 その別の網は受信した網間認証鍵を保持し、受信した乱
数を上記サービス要求をした移動端末へ送り、 上記サービス要求をした移動端末は受信した上記乱数
と、自己に保持している個有鍵とを用いて暗号演算を行
って網間認証鍵を生成して保持することを特徴とする網
間認証鍵生成方法。
1. A network to which a mobile terminal subscribes (home network)
Is a method of generating an inter-network authentication key used by the destination network to authenticate the mobile terminal in order to move from the network to another network and receive the service of that network, which is unique to the mobile terminal. The private key is held in the mobile terminal and the home network respectively, and when a service request is received from the mobile terminal to the other network, the other network sends the inter-network authentication key to the home network of the mobile terminal. When the home network receives the request for the inter-network authentication key, the home network generates a random number and performs an encryption operation using the random number and the private key of the mobile terminal to generate the inter-network authentication key. The inter-network authentication key and the random number are sent to the other network, and the other network holds the received inter-network authentication key, sends the received random number to the mobile terminal making the service request, and makes the service request. The mobile terminal has the received random number and its own Networks authentication key generation method characterized by holding the generated inter-network authentication key by performing a cryptographic operation using the and.
【請求項2】 加入者が加入している網(ホーム網)か
ら別の網に移動し、その網のサービスを受けるために、
その移動先網が上記加入者の認証を行うために用いる網
間認証鍵を生成する方法であって、 上記網のサービスを受けるために加入者番号などを記憶
したICカードを用いるようにし、 加入者に個有な個有鍵をその加入者のICカードに保持
させると共に、その加入者のホーム網に各加入者の上記
個有鍵を保持させ、 加入者から上記別の網にサービス要求を受けると、その
別の網は上記加入者のホーム網に網間認証鍵を要求し、 上記ホーム網は網間認証鍵の要求を受けると、乱数を生
成し、その乱数と、上記加入者のICカードの個有鍵と
を用いて暗号演算を行って網間認証鍵を生成し、 この網間認証鍵と上記乱数とを上記別の網へ送り、 その別の網は受信した網間認証鍵を保持し、受信した乱
数を上記サービス要求をした加入者のICカードへ送
り、 上記サービス要求をした加入者のICカードは受信した
上記乱数と、自己に保持している個有鍵とを用いて暗号
演算を行って網間認証鍵を生成して保持することを特徴
とする網間認証鍵生成方法。
2. In order to move from a network to which a subscriber subscribes (home network) to another network and receive services of that network,
A method of generating an inter-network authentication key used for the destination network to authenticate the subscriber, wherein an IC card storing a subscriber number or the like is used to receive services of the network, The subscriber holds his / her unique key in the IC card of the subscriber, and the subscriber's home network holds the above-mentioned private key of each subscriber, and the subscriber requests a service to the other network. Upon receiving the request, the other network requests an inter-network authentication key from the subscriber's home network, and when the home network receives the inter-network authentication key request, it generates a random number, and the random number and the subscriber's home network are generated. The inter-network authentication key is generated by performing a cryptographic operation using the unique key of the IC card, the inter-network authentication key and the random number are sent to the other network, and the other network receives the inter-network authentication. Hold the key and use the received random number as the IC card of the subscriber who made the above service request. The IC card of the subscriber who made the above service request performs cryptographic calculation using the received random number and the private key held by itself to generate and hold the inter-network authentication key. A method for generating an inter-network authentication key characterized by:
JP5200932A 1993-08-13 1993-08-13 Inter-network authentication key generating method Pending JPH0759154A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP5200932A JPH0759154A (en) 1993-08-13 1993-08-13 Inter-network authentication key generating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP5200932A JPH0759154A (en) 1993-08-13 1993-08-13 Inter-network authentication key generating method

Publications (1)

Publication Number Publication Date
JPH0759154A true JPH0759154A (en) 1995-03-03

Family

ID=16432692

Family Applications (1)

Application Number Title Priority Date Filing Date
JP5200932A Pending JPH0759154A (en) 1993-08-13 1993-08-13 Inter-network authentication key generating method

Country Status (1)

Country Link
JP (1) JPH0759154A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH099349A (en) * 1995-06-20 1997-01-10 Nec Commun Syst Ltd Verification control system
JPH11102471A (en) * 1997-09-26 1999-04-13 Ntt Data Corp Prepaid card system, certification system, reader, management device, and device certification method
US6363151B1 (en) 1996-07-31 2002-03-26 Siemens Aktiengesellschaft Method and system for subscriber authentification and/or encryption of items of information
JP2002537739A (en) * 1999-02-17 2002-11-05 テレフォンアクチーボラゲット エル エム エリクソン(パブル) Safe handover method
KR100377195B1 (en) * 1999-08-16 2003-03-28 한국전자통신연구원 Method For Authenticating Visiting User In Intelligent Network Interworking System
JP2007074180A (en) * 2005-09-06 2007-03-22 Bb Mobile Corp Communication system and communication method
JP2008530917A (en) * 2005-02-11 2008-08-07 クゥアルコム・インコーポレイテッド Context-restricted shared secret
JP2009094940A (en) * 2007-10-11 2009-04-30 Nippon Telegr & Teleph Corp <Ntt> Roaming system, roaming method, and, terminal identification method
JP5623657B2 (en) * 2011-11-24 2014-11-12 三菱電機株式会社 Cryptographic communication system, cryptographic processing apparatus, computer program, and cryptographic communication method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH099349A (en) * 1995-06-20 1997-01-10 Nec Commun Syst Ltd Verification control system
US6363151B1 (en) 1996-07-31 2002-03-26 Siemens Aktiengesellschaft Method and system for subscriber authentification and/or encryption of items of information
JPH11102471A (en) * 1997-09-26 1999-04-13 Ntt Data Corp Prepaid card system, certification system, reader, management device, and device certification method
JP4688296B2 (en) * 1999-02-17 2011-05-25 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Safe handover method
JP2002537739A (en) * 1999-02-17 2002-11-05 テレフォンアクチーボラゲット エル エム エリクソン(パブル) Safe handover method
KR100377195B1 (en) * 1999-08-16 2003-03-28 한국전자통신연구원 Method For Authenticating Visiting User In Intelligent Network Interworking System
JP2008530917A (en) * 2005-02-11 2008-08-07 クゥアルコム・インコーポレイテッド Context-restricted shared secret
JP2011227905A (en) * 2005-02-11 2011-11-10 Qualcomm Incorporated Context limited shared secret
US8726019B2 (en) 2005-02-11 2014-05-13 Qualcomm Incorporated Context limited shared secret
JP2014150567A (en) * 2005-02-11 2014-08-21 Qualcomm Incorporated Context limited shared secret
JP2007074180A (en) * 2005-09-06 2007-03-22 Bb Mobile Corp Communication system and communication method
JP4681990B2 (en) * 2005-09-06 2011-05-11 ソフトバンクBb株式会社 Communication system and communication system
JP2009094940A (en) * 2007-10-11 2009-04-30 Nippon Telegr & Teleph Corp <Ntt> Roaming system, roaming method, and, terminal identification method
JP5623657B2 (en) * 2011-11-24 2014-11-12 三菱電機株式会社 Cryptographic communication system, cryptographic processing apparatus, computer program, and cryptographic communication method

Similar Documents

Publication Publication Date Title
US5689563A (en) Method and apparatus for efficient real-time authentication and encryption in a communication system
Hwang et al. A self-encryption mechanism for authentication of roaming and teleconference services
KR101438243B1 (en) Sim based authentication
EP1787486B1 (en) Bootstrapping authentication using distinguished random challenges
EP0903887B1 (en) Cellular telephony authentication arrangement
US6225888B1 (en) Authentication between communicating parties in a telecommunications network
JPH09503895A (en) Method and apparatus for authenticating proof in a communication system
CA2720426C (en) Authentication of mobile devices over voice channels
US7131006B1 (en) Cryptographic techniques for a communications network
JPH06195024A (en) Method for establishment of communication channel and customer device
JP2003503896A (en) Method and configuration for secure link of entity authentication and encryption key generation
JPH08340331A (en) Method and apparatus for certificating access of user terminal to network
JPH06188877A (en) Encoding system
JP4131454B2 (en) A method for mutual authentication of devices in a network using the challenge-response method
EP0963636B1 (en) Authentication between communicating parties in a telecommunications network
JPH0759154A (en) Inter-network authentication key generating method
EP1311136A1 (en) Authentication in telecommunications networks
CN115715004A (en) Privacy protection cross-domain authentication method for large-scale heterogeneous network
US6961851B2 (en) Method and apparatus for providing communications security using a remote server
JP3421977B2 (en) Authentication method and system
JP2002505552A (en) Method and apparatus for ensuring access to services in a communication network
JPH04352525A (en) Mobile communication authentification system
JP3246969B2 (en) Authentication method
JPH05183507A (en) Mobile communication verification method
KR0175458B1 (en) Outgoing and called party handling method for legitimate user authentication in integrated telecommunication network