CN102387499A - Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission - Google Patents

Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission Download PDF

Info

Publication number
CN102387499A
CN102387499A CN2011103240060A CN201110324006A CN102387499A CN 102387499 A CN102387499 A CN 102387499A CN 2011103240060 A CN2011103240060 A CN 2011103240060A CN 201110324006 A CN201110324006 A CN 201110324006A CN 102387499 A CN102387499 A CN 102387499A
Authority
CN
China
Prior art keywords
authentication
sgsn
hlr
information
sres
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103240060A
Other languages
Chinese (zh)
Inventor
曹兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHONGQING BEIGAO GONGMING TECHNOLOGY Co Ltd
Original Assignee
CHONGQING BEIGAO GONGMING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING BEIGAO GONGMING TECHNOLOGY Co Ltd filed Critical CHONGQING BEIGAO GONGMING TECHNOLOGY Co Ltd
Priority to CN2011103240060A priority Critical patent/CN102387499A/en
Publication of CN102387499A publication Critical patent/CN102387499A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission. The method is characterized by comprising the following steps of: 1) carrying out authentication process: firstly, sending authentication information to an HLR (Home Location Register) by an SGSN (Service GPRS Supporting Node) and corresponding responding the authentication information by the HLR; sending an authentication triple into the SGSN; sending an authentication request to an MS (Mobile station) and calculating by the MS; and then judging whether an SRES' (Signed Response) which is sent by the SGSN is the same as an SRES which is sent by the HLR; 2) carrying out encryption process: firstly, generating a secret key by parameters and data through a ruled algorithm; permanently storing the secrete key on the HLR and the MS; and finally, carrying out data encryption on the obtained secrete key through a GEA (Global Elimination Algorithm) and then transmitting the encrypted secrete key into tower crane information through a 3G network. According to the method provided by the invention, the privacy and the safety of user communication are effectively protected and the requirements of the user on the authenticity and the privacy of the data are met; and the cost of the method is low so that the method is applicable to being widely popularized in a tower crane system.

Description

Authentication and encryption method based on the towering machine information of 3G transmission
Technical field
The present invention relates to a kind of wireless communications method, relate in particular between a kind of MS of utilization and the SGSN authentication and method of encrypting to improve method based on the towering machine information safety of 3G transmission.
Background technology
At present, the characteristics of wireless communication system are that user data must be exposed in the air interface of wireless access network in the process that transmits, and therefore, aloft the fail safe of transmission number of users receives threat to a certain degree on the interface.For the safety of guarantee information, the rights and interests of maintenance customer and operator, common solution are in the air interface of wireless access network user's data to be carried out encrypted transmission, thereby avoid user's data to be monitored and be cracked.In addition, the ability of the flexible networking of a lot of communication modes and the ability of communication service all very a little less than, apply it in the safety monitoring system of tower unit and can not satisfy the demand fully.
3G technology structure wireless transmitting system has real-time, characteristics such as construction cost is few, wide coverage, system transmission capacity is big, data transfer rate is high, charging way is flexible, communication cost is low now.3G has inherited the more original security means of GSM in addition; As adopt authentication to carry out user identity and detect; Prevent that the disabled user from inserting; Adopt P_TMSI (Packet Temporary Mobile Subscriber Identity) value as user's interim sign so that the disguise of user identity to be provided; In addition through guaranteeing the privacy and the integrality of data message than the more perfect encryption mechanism of GSM, be very easily as communication mode so 3G technology is applied to the safety monitoring system of tower unit.
Summary of the invention
The present invention is directed to the proposition of above problem, encrypt privacy and fail safe to guarantee information and develop between a kind of MS and SGSN that utilizes in the 3G network link.The technical scheme that the present invention adopts is following:
A kind of authentication and encryption method of the towering machine information based on 3G transmission is characterized in that comprising the steps:
1) authentication process is following:
When a, towering machine information transmitted through 3G network, at first SGSN sent authentication information to HLR, and HLR responds corresponding authentication information, sent the authentication tlv triple in SGSN;
B, SGSN send authentication request to MS, and above-mentioned authentication tlv triple is issued MS, and MS issues SGSN through authentication and encryption corresponding information with SRES ' through after calculating;
C, judge by SGSN whether the SRES that SRES ' and HLR sent out is identical, if the two is identical, then authentication success, otherwise failure;
2) ciphering process is following:
D, at first with parameter K iPass through regular A with data RAND 8Algorithm produces key K c
E and key K cBe permanently stored on HLR and the MS;
F, at last through obtaining key K cCarry out data encryption on the towering machine information of 3G network transmission through the GEA algorithm.
Encrypting in the said 3G system is between SGSN and MS, to be accomplished by the LLC layer.
Step c also comprises: SRES ' is inequality with the SRES that HLR is sent out when the SGSN judgement, and system sends the information that reports an error to tower machine total activation chamber behind the failed authentication, sends the information that reports an error through 3G network to the person in charge simultaneously.
This shows that use 3G as tower machine data information interaction means, not only network is laid simple; The data transmission set of supporting the 3G agreement is installed on the tower machine, is got final product networking, can also enjoy professional operation merchant's communication service; The charging means are comparatively flexible; Communication process also can effectively have been protected privacy, the fail safe of telex network through encrypting, and satisfies the requirement of user to data authenticity, privacy.And with low cost being suitable for extensively promoted in tower machine system.
Description of drawings
The present invention has two width of cloth accompanying drawings:
Fig. 1 is the sketch map of 3G authentication process in the embodiment of the invention;
Fig. 2 is the sketch map of 3G ciphering process in the embodiment of the invention.
Embodiment
Strengthening the towering machine information fail safe, is one of main target of native system, also is project consigner's basic demand, selects the wireless transmission method of 3G as native system, and the characteristics of its strong security are one of major consideration.In the 3G network, link is can be encrypted between MS and the SGSN, can reduce the probability that wireless messages is intercepted and captured aloft, improves its information private property, fail safe widely.Combine accompanying drawing that the authentication of these tower machine transmission data and the flow process of encryption are described down:
1) authentication process (as shown in Figure 1) as follows:
When a, towering machine information transmitted through 3G network, at first SGSN sent authentication information to HLR, and HLR responds corresponding authentication information, sent the authentication tlv triple in SGSN;
B, SGSN send authentication request to MS, and above-mentioned authentication tlv triple is issued MS, and MS issues SGSN through authentication and encryption corresponding information with SRES ' through after calculating;
C, judge by SGSN whether the SRES that SRES ' and HLR sent out is identical, if the two is identical, then authentication success, otherwise failure;
2) ciphering process (as shown in Figure 2) as follows:
D, at first with parameter K iPass through regular A with data RAND 8Algorithm produces key K c
E and key K cBe permanently stored on HLR and the MS;
F, at last through obtaining key K cCarry out data encryption on the towering machine information of 3G network transmission through the GEA algorithm.Wherein encrypt in the 3G communication system of this tower machine is between SGSN and MS, to be accomplished by LLC (Logic Link Control) layer.
Because the fail safe of tower machine is extremely important; For improve in the message transmitting procedure degree of safety and in message transmitting procedure monitoring personnel's monitoring degree: step c also comprises; When SGSN judges that the SRES that SRES ' and HLR are sent out is inequality; System sends the information that reports an error to tower machine total activation chamber behind the failed authentication, sends the information that reports an error through 3G network to the person in charge simultaneously, is convenient to personnel's monitoring and carries out the danger investigation.
The above; Be merely the preferable embodiment of the present invention; But protection scope of the present invention is not limited thereto; Any technical staff who is familiar with the present technique field is equal to replacement or change according to technical scheme of the present invention and inventive concept thereof in the technical scope that the present invention discloses, all should be encompassed within protection scope of the present invention.

Claims (3)

1. authentication and encryption method based on the towering machine information of 3G transmission is characterized in that comprising the steps:
1) authentication process is following:
When a, towering machine information transmitted through 3G network, at first SGSN sent authentication information to HLR, and HLR responds corresponding authentication information, sent the authentication tlv triple in SGSN;
B, SGSN send authentication request to MS, and above-mentioned authentication tlv triple is issued MS, and MS issues SGSN through authentication and encryption corresponding information with SRES ' through after calculating;
C, judge by SGSN whether the SRES that SRES ' and HLR sent out is identical, if the two is identical, then authentication success, otherwise failure;
2) ciphering process is following:
D, at first with parameter K iPass through regular A with data RAND 8Algorithm produces key K c
E and key K cBe permanently stored on HLR and the MS;
F, at last through obtaining key K cCarry out data encryption on the towering machine information of 3G network transmission through the GEA algorithm.
2. according to the authentication and the encryption method of the said a kind of towering machine information based on 3G transmission of claim 1, it is characterized in that encrypting in the said 3G system is between SGSN and MS, to be accomplished by the LLC layer.
3. ask the authentication and the encryption method of 1 said a kind of towering machine information based on 3G transmission; It is characterized in that said step c also comprises: when SGSN judges that the SRES that SRES ' and HLR are sent out is inequality; System sends the information that reports an error to tower machine total activation chamber behind the failed authentication, sends the information that reports an error through 3G network to the person in charge simultaneously.
CN2011103240060A 2011-10-21 2011-10-21 Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission Pending CN102387499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103240060A CN102387499A (en) 2011-10-21 2011-10-21 Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103240060A CN102387499A (en) 2011-10-21 2011-10-21 Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission

Publications (1)

Publication Number Publication Date
CN102387499A true CN102387499A (en) 2012-03-21

Family

ID=45826342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103240060A Pending CN102387499A (en) 2011-10-21 2011-10-21 Method for authenticating and encrypting tower crane information based on 3G (The 3rd Generation Telecommunication) transmission

Country Status (1)

Country Link
CN (1) CN102387499A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070201087A1 (en) * 2004-08-20 2007-08-30 Canon Kabushik Kiasha Group management apparatus, and information processing apparatus and method
CN101588579A (en) * 2008-05-20 2009-11-25 华为技术有限公司 System and method for authenticating user equipment and base station subsystem thereof
CN101646166A (en) * 2009-08-27 2010-02-10 大连海事大学 Authentication and encryption method of towering machine information based on GPRS transmission

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070201087A1 (en) * 2004-08-20 2007-08-30 Canon Kabushik Kiasha Group management apparatus, and information processing apparatus and method
CN101588579A (en) * 2008-05-20 2009-11-25 华为技术有限公司 System and method for authenticating user equipment and base station subsystem thereof
CN101646166A (en) * 2009-08-27 2010-02-10 大连海事大学 Authentication and encryption method of towering machine information based on GPRS transmission

Similar Documents

Publication Publication Date Title
CN102130768B (en) Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
CN102823282B (en) Key authentication method for binary CDMA
CN101094065B (en) Method and system for distributing cipher key in wireless communication network
CN100488281C (en) Method for acquring authentication cryptographic key context from object base station
US8724816B2 (en) Security service control method and wireless local area network terminal
CN103491531A (en) Method for using quantum keys to improve safety of electric power information transmission in power system WiMAX wireless communication network
CN101420686B (en) Industrial wireless network security communication implementation method based on cipher key
CN108683510A (en) A kind of user identity update method of encrypted transmission
CN104754581A (en) Public key password system based LTE wireless network security certification system
US20150229620A1 (en) Key management in machine type communication system
CN108377188A (en) A kind of quantum cryptography system for extraordinary emergent self-organized network communication
CN102333309B (en) Method, equipment system for key transmission in wireless local area network
CN105323754A (en) Distributed authentication method based on pre-shared key
CN102223634A (en) Method and device for controlling mode of accessing user terminal into Internet
CN101552984B (en) Base station secure accessing method of mobile communication system
CN102625307B (en) Wireless network access system
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
CN107295508A (en) A kind of LTE network entity authentication and key updating method
CN108235300B (en) Method and system for protecting user data security of mobile communication network
CN101938741A (en) Method, system and device for mutual authentication
CN112383917A (en) Beidou secure communication method and system based on quotient and secret algorithm
CN102572819A (en) Method, device and system for generating secret key
CN102056163B (en) Distributed mesh network key management method and wireless access point device
CN101784048B (en) Method and system for dynamically updating identity authentication and secret key agreement of secret key
CN106992866A (en) It is a kind of based on wireless network access methods of the NFC without certificate verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120321