CN107251520A - Method for the polymerization authentication protocol in M2M communication - Google Patents

Method for the polymerization authentication protocol in M2M communication Download PDF

Info

Publication number
CN107251520A
CN107251520A CN201680010918.1A CN201680010918A CN107251520A CN 107251520 A CN107251520 A CN 107251520A CN 201680010918 A CN201680010918 A CN 201680010918A CN 107251520 A CN107251520 A CN 107251520A
Authority
CN
China
Prior art keywords
equipment
server
mac
generation
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201680010918.1A
Other languages
Chinese (zh)
Inventor
时杰
王贵林
吴双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei International Pte Ltd
Original Assignee
Huawei International Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei International Pte Ltd filed Critical Huawei International Pte Ltd
Publication of CN107251520A publication Critical patent/CN107251520A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

The embodiments of the invention provide a kind of for M2M certificate servers and the end to end authentication agreement of M2M equipment, wherein the M2M certificate servers and M2M equipment are directly mutually authenticated.It need not assume that M2M gateways are credible.Avoid using group certification and group identifier.In addition, being mutually authenticated agreement using the technology based on symmetric key.

Description

Method for the polymerization authentication protocol in M2M communication
Technical field
It is more particularly, to multiple the present invention relates to a kind of machine-to-machine (Machine-to-Machine, M2M) communication system The method being mutually authenticated between M2M equipment and a server.
Background technology
Machine-to-machine (Machine-to-Machine, M2M) communication occurs between machine, with calculating and communication capacity. Existing many applications have M2M communication ability, such as personal health monitoring, intelligent-tracking and supply D-chain trace, intelligence electricity The equipment of net, automatic vending machine remote control etc..The quantity of the equipment or terminal that enable M2M is exponentially increased, it is contemplated that to 2014 Annual meeting increases to above 200,000,000 from 5,000 ten thousand in 2008, can up to 50,000,000,000 to the year two thousand twenty.
Fig. 1 shows typical M2M system architectures, including M2M equipment, M2M gateways and M2M certificate servers.In M2M systems In system, M2M equipment represents endpoint node, such as sensor, and M2M gateways represent data aggregate node, and M2M certificate servers are represented The M2M servers being authenticated to M2M equipment.M2M gateways provide bridge and M2M equipment are communicably coupled into M2M services Device, vice versa.Specifically, M2M equipment and M2M gateway direct communications, M2M gateways and M2M server direct communications.
Due to widely using for M2M communication, communication security is extremely important.How one safety problem is by M2M certifications Server carrys out certification M2M equipment.With 4G (forth generation mobile communication) use and 5G (the 5th generation mobile network) appearance, connect The quantity for connecing equipment significantly doubles.As 4G and 5G representative scene, the quantity of M2M equipment can be very huge, when all M2M are set During standby independent execution certification in a short time, the workload of M2M certificate servers is very huge.This may cause certificate server Excess load and collapse.Therefore, it is badly in need of a kind of effective and expansible authentication protocol.
Existing authentication protocol supports M2M certificate servers to be authenticated simultaneously to one group of M2M equipment.
A kind of existing group of authentication protocol is in " safe TS group authentication mechanism (Group Authentication Mechanism for Security TS) " OneM2M, SEC#11, in SEC-2014-0314R02 description and figure 2 illustrates. Fig. 2 group certification includes following three stages:
1. interior group certification:All M2M equipment in interior group are mutually authenticated with M2M gateways and set up escape way to enter one Step communication.
2. outer group certification:M2M gateways are mutually authenticated with M2M certificate servers and set up escape way further to lead to Letter.
3. set up End-to-End Security passage:M2M certificate servers pass through the escape way set up, i.e. M2M authentication services The escape way between escape way, M2M gateways and various M2M equipment between device and M2M gateways, sends out to all M2M equipment Send security document.Based on the shared key between security document and M2M certificate servers and M2M equipment, they derive with The session key communicated with one another, i.e. establish End-to-End Security passage.
In above-mentioned agreement, a group certification is proposed based on OneM2M communication constructions, wherein M2M equipment is referred to as application service section Point or application specific node, M2M gateways are referred to as intermediate node, and M2M certificate servers are referred to as infrastructure node.
Another group of authentication protocol is described in the A of Chinese patent application case CN 102223231.In the agreement, outer group Certification is handled in the first stage, and interior group of certification is in second stage processing.In addition, the agreement is based on LTE frameworks, wherein M2M equipment Referred to as user equipment (user equipment, UE), M2M certificate servers are referred to as LTE core network.
In above-mentioned and existing protocol, there is a kind of important hypothesis, i.e. M2M gateways are believable.For example, Fig. 2's In group authentication protocol, M2M certificate servers are not authenticated directly to M2M equipment.M2M equipment is only recognized by M2M gateways The successful M2M equipment of certification is notified to give M2M certificate servers by card, M2M gateways.Then, M2M certificate servers will be considered to these M2M equipment certification, because M2M gateways are believable.Therefore, M2M certificate servers directly can not be recognized M2M equipment Card;In other words, group authentication protocol does not support the end to end authentication between M2M certificate servers and M2M equipment.
The hypothesis has triggered a safety problem.It is difficult destruction that M2M gateways, which may not be, because the usual portion of M2M gateways Administration is out of doors.If attacker destroys M2M gateways, attacker can cheat M2M certificate servers and think some M2M equipment Success identity, even if these M2M equipment and bad authentication.
The content of the invention
The embodiments of the invention provide a kind of for M2M certificate servers and the end to end authentication agreement of M2M equipment, wherein The M2M certificate servers and M2M equipment are directly mutually authenticated.It need not assume that M2M gateways are credible.Avoid using group certification and Group identifier.In addition, being mutually authenticated agreement using the technology based on symmetric key.
It is used for the method by the multiple M2M equipment of server authentication there is provided a kind of.Methods described includes:
Using the technology based on symmetric key, based on the polymerization certification message received from gateway to the multiple M2M equipment Server authentication is carried out, the polymerization certification message is existed based on the multiple certification message received respectively from the multiple M2M equipment The gateway generation;And
Multiple authentication responses are generated, the multiple authentication response is sent to the multiple M2M equipment respectively by the gateway, At least some device authentication specified for the server in wherein the multiple authentication response, the device authentication will make Performed with the technology based on symmetric key at the M2M equipment for successfully carrying out server authentication in the multiple M2M equipment.
There is provided a kind of server for being authenticated to multiple M2M equipment.The server includes:Processor;With And storage device, it stores the computer-readable instruction for the computing device,
Wherein described processor is used for:Using the technology based on symmetric key, disappeared based on the polymerization certification received from gateway Breath the multiple M2M equipment is authenticated, it is described polymerization certification message based on from the multiple M2M equipment receive respectively it is many Individual certification message is generated in the gateway;Multiple authentication responses are generated, the multiple authentication response is distinguished by the gateway The multiple M2M equipment is sent to, wherein at least some equipment specified for the server in the multiple authentication response Certification, successful carry out server of the device authentication by the technology based on symmetric key of use in the multiple M2M equipment Performed at the M2M equipment of certification.
There is provided a kind of method for being authenticated to server.Methods described includes:
At the M2M equipment, the certification message for server authentication is generated using the technology based on symmetric key;
The certification message is sent to polymerize with a number of other certification message from a number of other M2M equipment to gateway, So as to generate the polymerization certification message for server authentication;
The authentication response generated from the gateway the reception server, the authentication response is that the polymerization certification message is entered One of multiple authentication responses obtained from row server authentication;And
Using the technology based on symmetric key, the authentication response generated based on the server is set to the server Standby certification.
There is provided a kind of M2M equipment, including:
Processor;And storage device, it stores the computer-readable instruction for the computing device.The processor For:The certification message for server authentication is generated using the technology based on symmetric key;The certification is sent to gateway to disappear Breath with a number of other certification message from a number of other M2M equipment to polymerize, so as to generate the polymerization for server authentication Certification message;The authentication response generated from the gateway the reception server, the authentication response is to the polymerization certification message One of multiple authentication responses obtained from carrying out server authentication;And the technology based on symmetric key is used, based on the clothes The authentication response of business device generation carries out device authentication to the server.
It is used to enter multiple machine-to-machine (Machine-to-Machine, M2M) equipment with a server there is provided one kind The method that row is mutually authenticated.Methods described includes:
Using the technology based on symmetric key, based on the multiple certification message received respectively from the multiple M2M equipment, Gateway generation polymerization certification message;
Using the technology based on symmetric key, based on the polymerization certification message received from the gateway to the multiple M2M equipment carries out server authentication;
Generation is sent to multiple authentication responses of the multiple M2M equipment respectively at the server;And
The multiple authentication response is sent to the multiple M2M equipment by the gateway respectively, wherein the certification rings At least some device authentication specified for the server in answering, the device authentication will use the skill based on symmetric key Performed at the M2M equipment of successful carry out server authentication of the art in the multiple M2M equipment.
It is used to be mutually authenticated multiple machine-to-machine (Machine-to-Machine, M2M) equipment there is provided one kind System.The system includes:Gateway and server, wherein the gateway is used for:Using the technology based on symmetric key, based on point The multiple certification message not received from the multiple M2M equipment, in gateway generation polymerization certification message,
Wherein described server is used for:Using the technology based on symmetric key, based on from the gateway receive it is described poly- Certification message is closed to be authenticated the multiple M2M equipment;Multiple certifications that generation is sent to the multiple M2M equipment respectively ring Should,
Wherein described gateway is additionally operable to:The multiple authentication response is sent to the multiple M2M equipment respectively, wherein described At least some device authentication specified for the server in authentication response, the device authentication will be used based on symmetrical close Performed at the M2M equipment of successful carry out server authentication of the technology of key in the multiple M2M equipment.
Brief description of the drawings
Below with reference to open embodiments of the invention are illustrated, in the example shown:
Fig. 1 shows typical M2M system architectures;
Fig. 2 shows existing group of authentication protocol;
Fig. 3 is the flow chart for showing polymerization authentication method according to the present invention;
Fig. 4 is shown polymerize identifying procedure between M2M equipment according to a first embodiment of the present invention and M2M servers;
Fig. 5 is shown polymerize identifying procedure between M2M equipment according to a second embodiment of the present invention and M2M servers;
Fig. 6 is shown polymerize identifying procedure between M2M equipment according to a third embodiment of the present invention and M2M servers;
Fig. 7 is shown polymerize identifying procedure between M2M equipment according to a fourth embodiment of the present invention and M2M servers;
Fig. 8 be show for authenticating device and find success identity equipment method flow chart.
Embodiment
The middle many details of statement are described below, to carry out understanding of having a thorough knowledge of to various embodiments of the present invention.However, this area Skilled artisan will appreciate that, it can put into practice the present invention's in the case of without some or all of these details Embodiment.In other cases, in order to not obscure the related fields of described embodiment redundantly, do not describe in detail ripe The process operation known.In the drawings, several all figures refer to same or analogous function or feature with same reference numerals.
Common element is described using ordinal number " first ", " second ", " the 3rd " etc. in specification and claims, only Show to refer to the different instances of similar element, it is not intended that imply that described element must be according to given time, space, row Name order or the order arranged in any other way, unless otherwise indicated.
Some concepts well known by persons skilled in the art used in specification and claims are described below:
Pseudo-random function (Pseudorandom Function, PRF) is two different sets (domain and models of a kind of mapping Enclose) effective certainty function.One PRF only has an input d (domain) and a hiding random seed (scope).Work as pseudorandom When function is run multiple times using identical input and seed, it exports identical value all the time.Nevertheless, for any input, Due to random seed, output looks like random.
Key derivation functions (key derivation function, KDF):Key derivation functions use pseudorandom letter Number goes out one or more private keys from the other known information inference such as the secret such as master key or password or pass code.
Message authentication code (Message Authentication Code, MAC):Message authentication code in cryptography is For the integrality of message and a bit of information of authenticity guarantee to be authenticated and provided to message.Completeness guarantee's detection is even Right and intentional message change, and the source of authenticity guarantee's confirmation message.
Bloom filter (Bloom Filter, bf):Bloom filter is a kind of section space-efficient data structure, is used for Test whether an element is set member.False positive match is possible, but false bear is impossible.Bloom filter is one The array bf of individual m bits, for representing the set S={ x with n element1,x2,…,xn, all bits in bf are initially all It is set to zero.There are k different hash function hiSome set element is mapped to uniformly random distribution by (), each hash function M array position in one.In the presence of two basic operations:Addition and inquiry.
Element x is added in filter bf, it is only necessary to by bit bf [hi(x) 1] is set to, wherein 1≤i≤k.
Inquire about element y (test y is whether in set), it is only necessary to test whether all bit bf [hi(y) all it is] 1.Such as Really all bits are all 1, then it is assumed that element y is in set;If any one bit is 0, the element is not certainly in set In.
The embodiments of the invention provide a kind of for M2M certificate servers and the end to end authentication agreement of M2M equipment, wherein M2M certificate servers and M2M equipment are directly mutually authenticated.It need not assume that M2M gateways are credible.
Fig. 3 is the flow chart 300 for showing polymerization authentication method according to the present invention.
In step 301, certification message is generated at each M2M equipment (hereinafter referred to as " equipment ") place to be certified.
In step 302, its certification message is sent to M2M gateways (hereinafter referred to as " gateway ") by each equipment.
In step 303, gateway receives certification message from each equipment.Gateway uses the technology based on symmetric key from reception Certification message generation it is one or more polymerization certification message.The polymerization can occur after situations below:The pre-configured time Interval is pass by, is either received certification message from all devices in network or is received a number of certification message, or Meet other standards, or the combination of several situations above.
In step 304, gateway sends polymerization certification message to M2M certificate servers (hereinafter referred to as " server ").
In step 305, server uses the technology based on symmetric key, and each equipment is carried out based on polymerization certification message Certification.
Within step 306, authentication result generation response collection of the server based on step 305, response collection includes server life Into the authentication response for being sent to each equipment respectively.
In step 307, server sends response collection to gateway.
In step 308, the corresponding certification for being sent to the particular device that gateway sends server generation to each equipment rings Should.
In a step 309, in any appliance, if the corresponding authentication response of the server generation received is believed comprising mistake Breath, then show that the server authentication of the particular device in step 305 has failed.Therefore, the identifying procedure of the particular device stops Only or interrupt.In any appliance, if the corresponding authentication response of the server generation received does not include error message, or should Authentication response, which is included, successfully to be indicated, then shows that the server authentication of the particular device in step 305 has succeeded, therefore flow is suitable Sequence is continuing with the technology based on symmetric key and carries out device authentication to server at the equipment of each success identity.
In the step 310, for arbitrary equipment, if equipment (in step 305) server authentication and server ( In step 309) device authentication all succeed, then escape way is set up between the equipment and server by gateway.
From the discussion above it is clear that step 301 to 304 be related to each equipment based on polymerization certification message server recognize Card;Subsequent step 305 is to 309 device authentication for being related to server, and the device authentication of server is by server in step Carried out respectively at each equipment of success identity in 305.
Fig. 4 is shown polymerize identifying procedure between M2M equipment according to a first embodiment of the present invention and M2M servers. The flow is based on the technology based on symmetric key.
The prerequisite of the present embodiment includes:M2M certificate servers and M2M equipment i shared key K each otheriWith equipment mark Know IDi;There are n M2M equipment to be certified.
In step 401, certification message is generated at each equipment i to be certified.Specifically, with mark IDi's Equipment i selection new parameters Pi, such as timestamp, and calculate temporary key Ki1=KDF (Ki,Pi) and equipment generation MAC Ti= FunMAC(Ki1,IDi), wherein FunMAC is MAC algorithms, for example, FunMAC is AES-CMAC algorithms.Certification message includes IDi、 PiAnd Ti
In step 402, each equipment i sends respective certification message (ID to gatewayi,Pi,Ti)。
In step 403, certification message { (ID is being received from all devices1,P1,T1),…,(IDn,Pn,Tn) after, gateway By the MAC { T of reception1,…,TnIt is polymerized to new or polymerization MAC T=CFun (T1,…,Tn), wherein CFun is compression function, Such as T=T1⊕…⊕Tn, or T=hash (T1||…||Tn), wherein hash is cryptographic Hash function.Input is multiple words The compression function of symbol string exports the shorter single character string of length.Here, in order to ensure polymerize authentication protocol safety, can use T=T1⊕…⊕TnOr T=hash (T1||…||Tn).The polymerization is performed using the technology based on symmetric key.
In step 404, gateway sends polymerization certification message ({ (ID to serveri,Pi)},T).The polymerization certification message Include the ID of n equipmentiAnd PiAnd polymerization MAC T.
In step 405, server is based on polymerization certification message, and n are performed using the technology based on symmetric key and is set Standby certification.Specifically, the equipment that server finds success identity, the mark ID of these successful devices is added to and successfully collected In SS.For those equipment of server authentication failure, mark ID is added in unsuccessfully collection FS.In description and claims It is equivalent to the mark ID of equipment being added in successfully collection SS or unsuccessfully collection FS it will be recognized that mention and adding devices in book Success collects in SS or unsuccessfully collection FS.A kind of equipment for being used for authenticating device and finding success identity will be described with reference to Fig. 8 later Method.
In a step 406, authentication result generation response collection RI=(SI, FI) of the server based on step 405, wherein RI bags Multiple authentication responses of server generation are included, SI includes being directed to the response message of all devices in successfully collection SS, and FI includes pin Response message to unsuccessfully collecting all devices in FS:
SI={ (IDi,P’i,T’i), wherein IDiIn SS, P 'iIt is new parameter, K 'i1=KDF (Ki,P’i), server The MAC T ' of generationi=FunMAC (K 'i1,IDi).For device idiSession key K 'i=KDF (Ki,Pi⊕P’i), wherein KDF is key derivation functions.
FI={ (IDj,AELj,P’j,T’j), wherein IDjIn FS, AELjIt is device idjAuthentication error information, P 'j It is new parameter, K 'j1=KDF (Kj,P’j), the MAC T ' of server generationj=FunMAC (K 'j1,IDj||AELj)。
In step 407, server sends response collection RI=(SI, FI) to gateway.
In a step 408, gateway sends the corresponding authentication response for responding the server generation concentrated to each equipment i (IDi,P’i,T’i) or (IDi,AELi,P’i,T’i)。
Step 409 is applied to unsuccessfully concentrate the equipment included, i.e. the equipment of server authentication failure in step 405.In step In rapid 409, if the authentication response of the server generation received at an equipment is (IDi,AELi,P’i,T’i), wherein wrong False information is AELi, then the authentification failure of the equipment, method stops.
Step 410 is applied to successfully concentrate the equipment included, i.e. the successful equipment of certification in step 405.In step 410 In, use the certification of the execute server at each equipment for successfully carrying out server authentication of the technology based on symmetric key.
Specifically, at the equipment of each success identity, equipment determines the authentication response (ID of server generationi,P’i, T’i) in the P ' that includesiAnd T 'iIt is whether all effective.If P 'iAnd T 'iIn any one is invalid, then authentification failure.If P 'i And T 'iAll effectively, then equipment session key K 'i=KDF (Ki,Pi⊕P’i)。
For checking new parameter PiThe method of validity depend on the type of new parameter used in certification.For example, If new parameter is timestamp, work as PiWhen not in predetermined scope, PiIt is invalid.
For determining MAC T 'iThe method of validity be described as follows:
(i) K is calculateda i1=KDF (Ki,P’i) and equipment generation MAC Ta i=FunMAC (Ka i1,IDi)。
(ii) equipment determines the MAC T ' of server generationiThe MAC T generated with equipmenta iIt is whether identical.If server The MAC T ' of generationiThe MAC T generated with equipmenta iIt is identical, it is determined that the MAC T ' of server generationiEffectively.If server The MAC T ' of generationiThe MAC T generated with equipmenta iIt is different, it is determined that the MAC T ' of server generationiIt is invalid.
Fig. 5 is shown polymerize identifying procedure between M2M equipment according to a second embodiment of the present invention and M2M servers. Second embodiment is similar to first embodiment.Second embodiment also includes making gateway share private key K ' with server.Gateway Random time before polymerization certification message is sent to server, i.e. the random time before step 404, performs and recognizes Being mutually authenticated for server is demonstrate,proved, and escape way is set up between them using shared key K '.After mutual authentication, gateway All communications between server, i.e. step 404,407 etc., will all be carried out by the escape way.
Fig. 6 is shown polymerize identifying procedure between M2M equipment according to a third embodiment of the present invention and M2M servers. 3rd embodiment also includes making each equipment share private key K " with gatewayi.Each equipment is sending certification message to gateway Random time before, i.e. the random time before step 402, execution is mutually authenticated with gateway, and uses shared key K”iEscape way is set up between them.After mutual authentication, all communications between equipment and gateway, i.e. step 402, 408 etc., it will all be carried out by correspondence escape way.
Fig. 7 is shown polymerize identifying procedure between M2M equipment according to a fourth embodiment of the present invention and M2M servers. Fourth embodiment can be considered the combination of second embodiment and 3rd embodiment.
In the fourth embodiment, gateway shares private key K ' with server.Gateway is sending polymerization certification to server Random time before message, i.e. the random time before step 404, execution is mutually authenticated with certificate server, and is made Escape way is set up between them with shared key K '.After mutual authentication, all communications between gateway and server, I.e. step 404,407 etc., will all be carried out by the escape way.
In the fourth embodiment, each equipment shares private key K " with gatewayi.Each equipment is sending certification to gateway Random time before message, i.e. the random time before step 402, execution is mutually authenticated with gateway, and using shared Key K "iEscape way is set up between them.After mutual authentication, all communications between equipment and gateway, i.e. step 402nd, 408 etc., it will all be carried out by correspondence escape way.
Fig. 8 be show for authenticating device and find success identity equipment method flow chart, this method can be upper State in step 405 and perform.
The prerequisite of Fig. 8 method includes:Server has been received by polymerization certification message ({ (IDi,Pi)},T)。
In step 801, server creates two empty sets, i.e., successfully collect SS and unsuccessfully collect FS, they will be stored into respectively Work(carries out the mark ID of the equipment of server authentication and the mark ID of the failed equipment for carrying out server authentication.In specification and In claims, mention by successfully carry out server authentication equipment be stored in successfully collection SS in be equivalent to successfully to carry out The mark ID of the equipment of server authentication is stored in successfully collection SS;Mention the failed equipment storage for carrying out server authentication It is equivalent to the mark ID of the failed equipment for carrying out server authentication being stored in unsuccessfully collection FS in unsuccessfully collection FS.
In step 802, server is based on polymerization certification message ({ (IDi,Pi), T) determine PiWhether to all devices i It is all effective.If it is determined that PiIt is invalid, then by the mark ID of the equipmentiIt is added to FS.
In step 803, server determines unsuccessfully whether collection FS is empty.If unsuccessfully collection FS is not sky, flow order Proceed to step 804.If unsuccessfully collection FS is sky, flow proceeds to step 806.
In step 804, a kind of error handling method for invalid new parameter may be selected in server.Server can basis The selection of other conditions proceeds to first method (step 804) for processing parameter mistake or for processing parameter mistake Two methods (step 806).
In step 805, the first method for processing parameter mistake includes the mark ID of all devices being added to mistake Lose in collection FS, then flow sequential advancement is to step 811, in step 811, Fig. 8 flow order terminates.
In step 806, server determines whether polymerization unit generation MAC T are effective.Determine polymerization unit generation MAC T The flow of validity be described as follows:
(i) K is calculated for all devices ib i1=KDF (Ki,Pi) and Tb i=FunMAC (Kb i1,IDi), and server is given birth to Into all MAC Tb iIt is polymerized to polymerization MAC Tb
(ii) server determines polymerization unit generation MAC T and aggregate server generation MAC TbIt is whether identical.If poly- Close equipment generation MAC T and aggregate server generation MAC TbIt is identical, it is determined that polymerization unit generation MAC T are effective.If poly- Close equipment generation MAC T and aggregate server generation MAC TbIt is different, it is determined that aggregate server generation MAC T are invalid.
If it is determined that polymerization unit generation MAC T are effectively, then flow sequential advancement is to step 811, in step 811, Fig. 8 Flow order terminate.If polymerization unit generation MAC T are invalid, flow sequential advancement to step 807.
In step 807, a kind of error handling method for invalid MAC may be selected in server.Server can be according to it The selection of its condition proceeds to the first method (step 808) for handling MAC mistakes or the second party for handling MAC mistakes Method (step 809) or the third method (step 810) for handling MAC mistakes.
In step 808, include the mark ID of all devices being added to failure for handling the first method of MAC mistakes Collect in FS, then flow sequential advancement is to step 811, in step 811, Fig. 8 flow order terminates.
In step 809, need to communicate between server and gateway for handling the second method of MAC mistakes.Second MAC error handling procedures are described as follows:
(i) server sends message to ask to be not included in the authentication information of all devices in unsuccessfully collection FS to gateway.
(ii) gateway sends detailed authentication information { (ID to certificate serveri,Pi,Ti)}。
(iii) server determines the MAC T of equipment generation respectively or on the basis of non-polymericiValidity.If TiNothing Effect, then by the mark ID of corresponding deviceiIt is added in unsuccessfully collection FS;If TiEffectively, then by device identification IDiIt is added to success Collect in SS.
In order to determine TiValidity, server calculates K ' firsti1=KDF (Ki,Pi) and T 'i=MAC (K 'i1,IDi), so The MAC T of equipment generation are determined afterwardsiThe MAC T ' generated with serveriIt is whether identical.If the MAC T of equipment generationiWith service The MAC T ' of device generationiIt is identical, it is determined that TiEffectively.If the MAC T of equipment generationiThe MAC T ' generated with serveriNo Together, it is determined that the MAC T ' of server generationiIt is invalid.
When step 809 is completed, flow sequential advancement to step 811, in step 811, Fig. 8 flow order terminates.
In step 810, need to communicate between server and gateway for handling the third method of MAC mistakes.The MAC Error handling procedures are described as follows:
(i) equipment for being not included in unsuccessfully collection FS, server is sent to pair based on Bloom filter to gateway Answer the request of authentication information.
(ii) gateway is based on authentication information { (IDi,Pi,Ti) create Bloom filter bf, wherein IDiIt is not included in FS, That is, by all TiIt is added in Bloom filter bf, all bits therein are all initially 0.
(iii) gateway sends the Bloom filter bf created to server.
(iv) server creates two interim set:Successfully collect TSS temporarily and unsuccessfully collect TFS temporarily.For all devices i Calculate Kc i1=KDF (Ki,Pi) and Tc i=FunMAC (Kc i1,IDi), and inquire about in bf Tc i.If the MAC of server generation Tc iIt is present in bf, then by corresponding device identification IDiIt is added in TSS.If the MAC T of server generationc iNot in bf, Then by corresponding device identification IDiIt is added in TFS.
(v) server sends TSS to gateway.
(vi) ID is identified for all devices in TSSi, gateway with identical method in Fig. 4 step 403 using being based on The MAC T of equipment generationiTo calculate polymerization T '.
(vii) gateway sends polymerization MAC T ' to server.
(viii) whether server inspection polymerization MAC T ' are effective., will be all in TSS if polymerizeing MAC T ' effectively Device identification and other information are all added in SS, and all devices mark and other information in TFS are all added in FS.Such as Fruit polymerization MAC T ' are invalid, then are all added to all devices mark and other information in TSS and TFS in FS.
Determine that whether effective T ' methods be similar to step 806, but only for the device identification ID in TSSi.Work as step During 810 completion, flow sequential advancement to step 811, in step 811, Fig. 8 flow order terminates.
Step 811 draw Fig. 4 step 406, wherein polymerization certification as described in Fig. 4 flow order after It is continuous.
Although the method that Fig. 8 includes various processing new parameter mistakes and processing MAC mistakes, it can be appreciated that, at this In some embodiments of invention, above-mentioned portion can be used in the case where combining or not combining other possible error handling methods Divide or whole error handling methods.
By the present invention, certificate server is mutually authenticated with one group of equipment, and sets up exclusive meeting for each equipment Talk about key.Therefore, the present invention provides the advantage that including but not limited to following:
(i) in the present invention, server is based only upon polymerization certification message and multiple equipment is authenticated.Therefore, server Certification work amount, including communication and computing cost, substantially reduced.
(ii) in addition, the certification message that server is received is polymerize obtained from the certification message from each equipment.Therefore, Gateway can not possibly forge polymerization certification message and carry out spoofing server, so not requiring that gateway node is believable.
Embodiments of the invention may be used on any including the communication system of equipment (or terminal), gateway and certificate server System.Communication system can be fixed network or mobile network.If for example, the present invention is applied to communication network, operator's net Network can be authenticated by gateway to multiple user equipmenies (user equipment, UE).
Those skilled in the art are according to considering and to practice of the invention it will be clear that other implementations to this specification Example.In addition, for description definition purpose used some terms and these terms without limitation on the present invention disclosed reality Apply example.Examples described above and feature should be considered as exemplary.

Claims (44)

1. one kind is used for the method by the multiple machine-to-machine of server authentication (Μ of Machine-to-Machine, Μ 2) equipment, its It is characterised by, methods described includes:
Using the technology based on symmetric key, the multiple M2M equipment is carried out based on the polymerization certification message received from gateway Server authentication, the polymerization certification message is based on the multiple certification message received respectively from the multiple M2M equipment described Gateway is generated;And
Multiple authentication responses are generated, the multiple authentication response is sent to the multiple M2M equipment respectively by the gateway, wherein At least some device authentication specified for the server in the multiple authentication response, the device authentication will use base Performed at the M2M equipment of successful carry out server authentication of the technology in the multiple M2M equipment of symmetric key.
2. according to the method described in claim 1, it is characterised in that the polymerization certification message includes:
The first multiple equipment generation message authentication code (Message from included in the multiple certification message Authentication Code, MAC) calculate polymerization unit generation MAC,
Carrying out server authentication to the multiple M2M equipment includes:
The multiple equipment that checking is included in the polymerization certification message generates the validity of new parameter, and
Verify that the polymerization unit generation MAC generates MAC validity, the first polymerization clothes relative to the first aggregate server Business device generation MAC is calculated from more than the first server generation MAC of the multiple M2M equipment, and
Generating multiple authentication responses includes:
More than the second server generation MAC of the multiple M2M equipment is calculated, wherein more than second server generates MAC Included in the multiple authentication response, server authentication is successfully carried out relative in the multiple M2M equipment for verifying Multiple second equipment of M2M equipment generate MAC validity.
3. method according to claim 2, it is characterised in that if any one in the multiple equipment generation new parameter It is individual invalid, or if polymerization unit generation MAC is invalid relative to first aggregate server generation MAC, then it is described Method also includes:
The multiple M2M equipment is added to and unsuccessfully concentrated.
4. method according to claim 2, it is characterised in that if any one in the multiple equipment generation new parameter Individual invalid, then methods described also includes:
Any M2M equipment with invalid equipment generation new parameter in the multiple M2M equipment is added to and unsuccessfully concentrated;
The subset of the multiple certification message is obtained from the gateway, the subset corresponds in the multiple M2M equipment not The remainder concentrated included in the failure;And
First multiple equipment of the checking included in the subset of the multiple certification message on the basis of non-polymeric Generate MAC validity;
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message It is individual effective, then the subset of correspondence first that there is effective equipment to generate MAC in the multiple M2M equipment is added to and successfully collected In;And
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message It is individual invalid, then the corresponding yield in the second subset that there is invalid equipment to generate MAC in the multiple M2M equipment is added to the mistake Lose concentration.
5. method according to claim 2, it is characterised in that if any one in the multiple equipment generation new parameter Individual invalid, then methods described also includes:
Any M2M equipment with invalid equipment generation new parameter in the multiple M2M equipment is added to and unsuccessfully concentrated;
Bloom filter is received from the gateway, the Bloom filter is based in the multiple certification message in the gateway It is one or more and create, one or more of the multiple certification message and not including in the multiple M2M equipment The remainder correspondence concentrated in the failure;
Calculate the 3rd many server generation MAC of the multiple M2M equipment;
The described 3rd many server generation MAC are inquired about in the Bloom filter;
, will be with described the if the 3rd multiple equipment generation MAC the first subset is present in the Bloom filter First subset of the three multiple equipments generation MAC corresponding the multiple M2M equipment of first subset is added to interim success Collect in (temporary success set, TSS);
If the yield in the second subset of the 3rd multiple equipment generation MAC, will be with the described 3rd not in the Bloom filter The yield in the second subset of the multiple equipment generation MAC corresponding the multiple M2M equipment of the yield in the second subset is added to unsuccessfully to be collected temporarily In (temporary failure set, TFS);
Verify interim polymerization unit generation MAC relative to included in the interim successfully collection (temporary success set, 4th many servers of first subset of the multiple M2M equipment in TSS) generate MAC validity, wherein described Interim polymerization unit generation MAC is received from the gateway;
If the interim polymerization unit generation MAC is effectively, first subset of the multiple M2M equipment is added to institute State and successfully concentrate;And
If the interim polymerization unit generation MAC is invalid, first subset of the multiple M2M equipment is added to institute State and unsuccessfully concentrate, and the yield in the second subset of the multiple M2M equipment is added to described unsuccessfully concentrated.
6. method according to claim 2, it is characterised in that generate the described poly- of MAC from first multiple equipment Equipment generation MAC is closed to calculate in the following manner:
Compression function is performed to first multiple equipment generation MAC.
7. method according to claim 2, it is characterised in that the multiple new parameter includes timestamp.
8. the method according to any one of claim 1 to 7, it is characterised in that also include:
Before the polymerization certification message is received from the gateway, the server is mutually authenticated with the gateway, And the first escape way is set up between them.
9. the method according to any one of claim 1 to 7, it is characterised in that also include:
Before the polymerization certification message is received from the gateway, the server is mutually authenticated with the gateway, And set up the first escape way between the server and the gateway, wherein the gateway with the multiple M2M equipment It is mutually authenticated and multiple second escape ways has been set up between them.
10. one kind is used for the server being authenticated to multiple machine-to-machine (Machine-to-Machine, M2M) equipment, it is special Levy and be, the system includes:Processor;And storage device, it stores the computer-readable finger for the computing device Order,
Wherein described processor is used for:Using the technology based on symmetric key, based on the polymerization certification message pair received from gateway The multiple M2M equipment is authenticated, and the polymerization certification message multiple is recognized based on what is received respectively from the multiple M2M equipment Card message is generated in the gateway;Multiple authentication responses are generated, the multiple authentication response is sent to respectively by the gateway The multiple M2M equipment, wherein at least some device authentication specified for the server in the multiple authentication response, Successful carry out server authentication of the device authentication by the technology based on symmetric key of use in the multiple M2M equipment Performed at M2M equipment.
11. server according to claim 10, it is characterised in that the polymerization unit generates message authentication code (Message Authentication Code, MAC) is the first multiple equipment life from included in the multiple certification message Calculated into MAC, and
The processor is additionally operable to:Checking is included in the effective of the multiple equipment generation new parameter in the polymerization certification message Property;Verify that the polymerization unit generation MAC generates MAC validity, the first polymerization clothes relative to the first aggregate server Business device generation MAC is calculated from more than the first server generation MAC of the multiple M2M equipment;Calculate the multiple M2M More than the second server generation MAC of equipment, rings wherein more than second server generates MAC included in the multiple certification Ying Zhong, for verifying multiple second equipment relative to the M2M equipment that server authentication is successfully carried out in the multiple M2M equipment Generate MAC validity.
12. server according to claim 11, it is characterised in that if appointing in the multiple equipment generation new parameter What one invalid, or if polymerization unit generation MAC is invalid relative to first aggregate server generation MAC, then The processor is additionally operable to:The multiple M2M equipment is added to and unsuccessfully concentrated.
13. server according to claim 11, it is characterised in that if appointing in the multiple equipment generation new parameter What one invalid, then the processor is additionally operable to:Will be any with the invalid new ginseng of equipment generation in the multiple M2M equipment Several M2M equipment, which is added to, unsuccessfully to be concentrated;The subset of the multiple certification message is obtained from the gateway, the subset corresponds to The remainder that the failure is concentrated is not included in the multiple M2M equipment;And bag is verified on the basis of non-polymeric First multiple equipment being contained in the subset of the multiple certification message generates MAC validity,
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message Individual effective, then the server is additionally operable to:In the multiple M2M equipment will there is effective equipment to generate MAC correspondence the One subset, which is added to, successfully to be concentrated, and
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message Individual invalid, then the server is additionally operable to:By the correspondence the with invalid equipment generation MAC in the multiple M2M equipment Two subsets, which are added to, described unsuccessfully to be concentrated.
14. server according to claim 11, it is characterised in that if appointing in the multiple equipment generation new parameter What one invalid, then the processor is additionally operable to:
Any M2M equipment with invalid equipment generation new parameter in the multiple M2M equipment is added to and unsuccessfully concentrated;
Bloom filter is received from the gateway, the Bloom filter is based in the multiple certification message in the gateway It is at least some and create, be not included in institute at least some and the multiple M2M equipment in the multiple certification message State the remainder correspondence unsuccessfully concentrated;
Calculate the 3rd many server generation MAC of the multiple M2M equipment;
The described 3rd many server generation MAC are inquired about in the Bloom filter;
, will be with described the if the 3rd multiple equipment generation MAC the first subset is present in the Bloom filter First subset of the three multiple equipments generation MAC corresponding the multiple M2M equipment of first subset is added to interim success Collect in (temporary success set, TSS);
If the yield in the second subset of the 3rd multiple equipment generation MAC, will be with the described 3rd not in the Bloom filter The yield in the second subset of the multiple equipment generation MAC corresponding the multiple M2M equipment of the yield in the second subset is added to unsuccessfully to be collected temporarily In (temporary failure set, TFS);
Verify interim polymerization unit generation MAC relative to included in the interim successfully collection (temporary success set, 4th many servers of first subset of the multiple M2M equipment in TSS) generate MAC validity, wherein described Interim polymerization unit generation MAC is received from the gateway;
If the interim polymerization unit generation MAC is effectively, first subset of the multiple M2M equipment is added to institute State and successfully concentrate;
If the interim polymerization unit generation MAC is invalid, first subset of the multiple M2M equipment is added to institute State and unsuccessfully concentrate, and the yield in the second subset of the multiple M2M equipment is added to described unsuccessfully concentrated.
15. server according to claim 11, it is characterised in that the polymerization unit generation MAC is in the following manner Calculate:Compression function is performed to first multiple equipment generation MAC.
16. server according to claim 11, it is characterised in that the multiple new parameter includes timestamp.
17. the server according to any one of claim 10 to 16, it is characterised in that the processor is additionally operable to: Before the polymerization certification message is received from the gateway, it is mutually authenticated with the gateway, and set up between them First escape way.
18. the server according to any one of claim 10 to 16, it is characterised in that the processor is additionally operable to: Before the polymerization certification message is received from the gateway, be mutually authenticated with the gateway, and in the server and The first escape way is set up between the gateway, wherein the gateway be mutually authenticated with the multiple M2M equipment and Multiple second escape ways have been set up between them.
19. a kind of method for being authenticated to server, it is characterised in that methods described includes:
At machine-to-machine (Machine to Machine, M2M) equipment, generated using the technology based on symmetric key for servicing The certification message of device certification;
The certification message is sent to polymerize with a number of other certification message from a number of other M2M equipment to gateway, so that Generate the polymerization certification message for server authentication;
The authentication response generated from the gateway the reception server, the authentication response is that the polymerization certification message is taken One of multiple authentication responses obtained from business device certification;And
Using the technology based on symmetric key, equipment is carried out to the server based on the authentication response that the server is generated and recognized Card.
20. method according to claim 19, it is characterised in that the authentication response based on server generation is to described Server, which carries out device authentication, to be included:
Checking is included in the validity of the new parameter of the server generation in the authentication response that the server is generated;
The message authentication code (Message Authentication Code, MAC) of authentication server generation is generated relative to equipment MAC validity;And
If the new parameter of the server generation is effectively, and the MAC of server generation is generated relative to the equipment MAC effectively, then escape way is set up between the M2M equipment and the server by the gateway.
21. the method according to any one of claim 19 or 20, it is characterised in that also include:
Before the certification message is sent to gateway, the M2M equipment and the gateway are mutually authenticated, and at them Between set up escape way.
22. a kind of machine-to-machine (Machine-to-Machine, M2M) equipment, it is characterised in that including:
Processor;And storage device, it stores the computer-readable instruction for the computing device, wherein the processor For:The certification message for server authentication is generated using the technology based on symmetric key;The certification is sent to gateway to disappear Breath with a number of other certification message from a number of other M2M equipment to polymerize, so as to generate the polymerization for server authentication Certification message;The authentication response generated from the gateway the reception server, the authentication response is to the polymerization certification message One of multiple authentication responses obtained from carrying out server authentication;And the technology based on symmetric key is used, based on the clothes The authentication response of business device generation carries out device authentication to the server.
23. M2M equipment according to claim 22, it is characterised in that the processor is additionally operable to:Checking is included in described The validity of the new parameter of server generation in the authentication response of server generation, the message authentication code of authentication server generation The validity of (Message Authentication Code, MAC) relative to the MAC that equipment is generated, and
If the new parameter of the server generation is effectively, and the MAC of server generation is generated relative to the equipment MAC effectively, then escape way is set up between the M2M equipment and the server by the gateway.
24. the M2M equipment according to any one of claim 22 and 23, it is characterised in that the processor is additionally operable to: Before the certification message is sent to gateway, the M2M equipment and the gateway are mutually authenticated, and between them Set up escape way.
25. one kind is used to mutually recognize each other multiple machine-to-machine (Machine-to-Machine, M2M) equipment with a server The method of card, it is characterised in that methods described includes:
Using the technology based on symmetric key, based on the multiple certification message received respectively from the multiple M2M equipment, in gateway Place's generation polymerization certification message;
Using the technology based on symmetric key, based on the polymerization certification message received from the gateway to the multiple M2M Equipment carries out server authentication;
Generation is sent to multiple authentication responses of the multiple M2M equipment respectively at the server;And
The multiple authentication response is sent to the multiple M2M equipment by the gateway respectively, wherein in the authentication response At least some device authentication specified for the server, the device authentication will be existed using the technology based on symmetric key Performed at the M2M equipment of successful carry out server authentication in the multiple M2M equipment.
26. method according to claim 25, it is characterised in that include in gateway generation polymerization certification message:
The first multiple equipment generation message authentication code (Message from included in the multiple certification message Authentication Code, MAC) polymerization unit generation MAC is calculated,
Carrying out server authentication to the multiple equipment includes:
The multiple equipment that checking is included in the polymerization certification message generates the validity of new parameter, and
Verify that the polymerization unit generation MAC generates MAC validity, the first polymerization clothes relative to the first aggregate server Business device generation MAC is calculated from more than the first server generation MAC of the multiple M2M equipment,
Multiple authentication responses are generated at the server to be included:
More than the second server generation MAC of the multiple M2M equipment is calculated, wherein more than second server generates MAC Included in the multiple authentication response, server authentication is successfully carried out relative in the multiple M2M equipment for verifying Multiple second equipment of M2M equipment generate MAC validity.
27. method according to claim 26, it is characterised in that if any in the multiple equipment generation new parameter One invalid, or if the polymerization unit generates MAC, then institute invalid relative to first aggregate server generation MAC Stating method also includes:
The multiple M2M equipment is added to and unsuccessfully concentrated.
28. method according to claim 26, it is characterised in that if any in the multiple equipment generation new parameter One invalid, then methods described also includes:
Any M2M equipment with invalid equipment generation new parameter in the multiple M2M equipment is added to and unsuccessfully concentrated;
The subset of the multiple certification message is obtained from the gateway, the subset corresponds in the multiple M2M equipment not The remainder concentrated included in the failure;And
First multiple equipment of the checking included in the subset of the multiple certification message on the basis of non-polymeric Generate MAC validity;
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message It is individual effective, then the subset of correspondence first that there is effective equipment to generate MAC in the multiple M2M equipment is added to and successfully collected In;And
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message It is individual invalid, then the corresponding yield in the second subset that there is invalid equipment to generate MAC in the multiple M2M equipment is added to the mistake Lose concentration.
29. method according to claim 26, it is characterised in that if any in the multiple equipment generation new parameter One invalid, then methods described also includes:
Any M2M equipment with invalid equipment generation new parameter in the multiple M2M equipment is added to and unsuccessfully concentrated;
Bloom filter (bf) is created in the gateway based on one or more of the multiple certification message, it is the multiple One or more of certification message and the remainder pair that the failure is concentrated that is not included in the multiple M2M equipment Should;
The Bloom filter is sent to the server;
Calculate the 3rd many server generation MAC of the multiple M2M equipment;
The described 3rd many server generation MAC are inquired about in the Bloom filter;
, will be with described the if the 3rd multiple equipment generation MAC the first subset is present in the Bloom filter First subset of the three multiple equipments generation MAC corresponding the multiple M2M equipment of first subset is added to interim success Collect in (temporary success set, TSS);
If the yield in the second subset of the 3rd multiple equipment generation MAC, will be with the described 3rd not in the Bloom filter The yield in the second subset of the multiple equipment generation MAC corresponding the multiple M2M equipment of the yield in the second subset is added to unsuccessfully to be collected temporarily In (temporary failure set, TFS);
Calculate described many included in the interim successfully collection (temporary success set, TSS) in the gateway The interim polymerization unit generation MAC of first subset of individual M2M equipment;
Verify that the interim polymerization unit generation MAC successfully collects temporarily relative to included in described at the server 4th many servers of first subset of the multiple M2M equipment in (temporary success set, TSS) Generate MAC validity;
If the interim polymerization unit generation MAC is effectively, first subset of the multiple M2M equipment is added to institute State and successfully concentrate;And
If the interim polymerization unit generation MAC is invalid, first subset of the multiple M2M equipment is added to institute State and unsuccessfully concentrate, and the yield in the second subset of the multiple M2M equipment is added to described unsuccessfully concentrated.
30. method according to claim 26, it is characterised in that calculate polymerization unit from the first multiple equipment generation MAC Generation MAC includes:
Compression function is performed to first multiple equipment generation MAC.
31. method according to claim 26, it is characterised in that the multiple new parameter includes timestamp.
32. the method according to any one of claim 25 to 31, it is characterised in that also include:
Before the polymerization certification message is sent to the server, the gateway is mutually recognized each other with the server Card, and the first escape way is set up between them.
33. the method according to any one of claim 25 to 31, it is characterised in that also include:
Before the gateway receives the multiple certification message, to the gateway with it is each in the multiple M2M equipment It is individual to be mutually authenticated, and the second escape way is set up between them.
34. the method according to any one of claim 25 to 31, it is characterised in that also include:
Before the polymerization certification message is sent to the server, the gateway is mutually recognized each other with the server Card, and the first escape way is set up between them;And
Before the gateway receives the multiple certification message, the gateway is entered with each in the multiple equipment Row is mutually authenticated, and sets up the second escape way between them.
35. one kind is used for the system being mutually authenticated to multiple machine-to-machine (Machine-to-Machine, M2M) equipment, its It is characterised by, the system includes:Gateway and server, wherein the gateway is used for:Use the technology based on symmetric key, base In the multiple certification message received respectively from the multiple M2M equipment, in gateway generation polymerization certification message,
Wherein described server is used for:Using the technology based on symmetric key, recognized based on the polymerization received from the gateway Card message is authenticated to the multiple M2M equipment;Generation is sent to multiple authentication responses of the multiple M2M equipment respectively,
Wherein described gateway is additionally operable to:The multiple authentication response is sent to the multiple M2M equipment respectively, wherein the certification At least some device authentication specified for the server in response, the device authentication is by using based on symmetric key Performed at the M2M equipment of successful carry out server authentication of the technology in the multiple M2M equipment.
36. system according to claim 35, it is characterised in that the gateway is additionally operable to:Recognize from included in the multiple The the first multiple equipment generation message authentication code (Message Authentication Code, MAC) demonstrate,proved in message calculates polymerization Equipment generates MAC, and
The server is additionally operable to:Checking is included in the effective of the multiple equipment generation new parameter in the polymerization certification message Property;Verify that the polymerization unit generation MAC generates MAC validity, the first polymerization clothes relative to the first aggregate server Business device generation MAC is calculated from more than the first server generation MAC of the multiple M2M equipment;Calculate the multiple M2M More than the second server generation MAC of equipment, rings wherein more than second server generates MAC included in the multiple certification Ying Zhong, for verifying multiple second equipment relative to the M2M equipment that server authentication is successfully carried out in the multiple M2M equipment Generate MAC validity.
37. system according to claim 36, it is characterised in that if any in the multiple equipment generation new parameter One invalid, or if the polymerization unit generates MAC, then institute invalid relative to first aggregate server generation MAC Server is stated to be additionally operable to:The multiple M2M equipment is added to and unsuccessfully concentrated.
38. system according to claim 36, it is characterised in that if any in the multiple equipment generation new parameter One invalid, then the server is additionally operable to:Will be any with invalid equipment generation new parameter in the multiple M2M equipment M2M equipment be added to and unsuccessfully concentrate;The subset of the multiple certification message is obtained from the gateway, the subset corresponds to institute State the remainder that the failure is concentrated that is not included in multiple M2M equipment;And verify and include on the basis of non-polymeric First multiple equipment in the subset of the multiple certification message generates MAC validity,
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message Individual effective, then the server is additionally operable to:In the multiple M2M equipment will there is effective equipment to generate MAC correspondence the One subset, which is added to, successfully to be concentrated, and
If any one in first multiple equipment generation MAC included in the subset of the multiple certification message Individual invalid, then the server is additionally operable to:By the correspondence the with invalid equipment generation MAC in the multiple M2M equipment Two subsets, which are added to, described unsuccessfully to be concentrated.
39. system according to claim 36, it is characterised in that if any in the multiple equipment generation new parameter One invalid, then the server is additionally operable to:Will be any with invalid equipment generation new parameter in the multiple M2M equipment M2M equipment be added to and unsuccessfully concentrate;
The gateway is additionally operable to:Bloom filter (bf) is created based on one or more of the multiple certification message, it is described One or more of multiple certification message and the remainder that the failure is concentrated that is not included in the multiple M2M equipment Correspondence;And the Bloom filter is sent to the server,
The server is additionally operable to:Calculate the 3rd many server generation MAC of the multiple M2M equipment;In the grand mistake of the cloth The described 3rd many server generation MAC are inquired about in filter;If the first subset of the 3rd multiple equipment generation MAC is present It is in the Bloom filter, then first subset that MAC is generated with the 3rd multiple equipment is corresponding the multiple First subset of M2M equipment is added in interim successfully collection (temporary success set, TSS);If more than the described 3rd Individual equipment generation MAC yield in the second subset will then generate MAC institute not in the Bloom filter with the 3rd multiple equipment The yield in the second subset for stating the corresponding the multiple M2M equipment of yield in the second subset is added to interim unsuccessfully collection (temporary failure Set, TFS) in,
The gateway is additionally operable to:Calculate the institute being included in the interim successfully collection (temporary success set, TSS) State the interim polymerization unit generation MAC of first subset of multiple M2M equipment;Verify the interim polymerization unit generation MAC Relative to the institute of the multiple M2M equipment included in the interim successfully collection (temporary success set, TSS) The 4th many servers for stating the first subset generate MAC validity,
The server is additionally operable to:If the interim polymerization unit generation MAC is effectively, by the institute of the multiple M2M equipment State the first subset and be added to and described successfully concentrate;If the interim polymerization unit generation MAC is invalid, by the multiple M2M First subset of equipment be added to it is described unsuccessfully concentrate, and the yield in the second subset of the multiple M2M equipment is added to It is described unsuccessfully to concentrate.
40. system according to claim 36, it is characterised in that the gateway is additionally operable to give birth to first multiple equipment Compression function is performed into MAC.
41. system according to claim 36, it is characterised in that the multiple new parameter includes timestamp.
42. the system according to any one of claim 35 to 41, it is characterised in that the gateway is additionally operable to:To The server is sent before the polymerization certification message, is mutually authenticated with the server, and set up between them First escape way.
43. the system according to any one of claim 35 to 41, it is characterised in that the gateway is additionally operable to:Connecing Receive before the multiple certification message, be mutually authenticated with each in the multiple M2M equipment, and build between them Vertical second escape way.
44. the system according to any one of claim 35 to 41, it is characterised in that the gateway is additionally operable to:To The server is sent before the polymerization certification message, and the gateway is mutually authenticated with the server, and at it Between set up the first escape way;And before the multiple certification message is received, the gateway is set with the multiple Each in standby is mutually authenticated, and sets up the second escape way between them.
CN201680010918.1A 2015-04-20 2016-04-12 Method for the polymerization authentication protocol in M2M communication Withdrawn CN107251520A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SG10201503071U 2015-04-20
SG10201503071UA SG10201503071UA (en) 2015-04-20 2015-04-20 Method for aggregate authentication protocol in m2m communication
PCT/SG2016/050177 WO2016171618A1 (en) 2015-04-20 2016-04-12 Method for aggregate authentication protocol in m2m communication

Publications (1)

Publication Number Publication Date
CN107251520A true CN107251520A (en) 2017-10-13

Family

ID=55910314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680010918.1A Withdrawn CN107251520A (en) 2015-04-20 2016-04-12 Method for the polymerization authentication protocol in M2M communication

Country Status (3)

Country Link
CN (1) CN107251520A (en)
SG (1) SG10201503071UA (en)
WO (1) WO2016171618A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971397A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Communication method, communication device, server and system
CN113302895A (en) * 2018-11-23 2021-08-24 泰雷兹数字安全法国股份有限公司 Method and apparatus for authenticating a group of wireless communication devices
CN116743413A (en) * 2022-10-26 2023-09-12 荣耀终端有限公司 Internet of things equipment authentication method and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022056510A1 (en) * 2020-09-10 2022-03-17 Microchip Technology Incorporated Aggregation of data for frames or disaggregation of data from frames

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223231B (en) 2010-04-16 2016-03-30 中兴通讯股份有限公司 M2M terminal authentication system and authentication method
US9450928B2 (en) * 2010-06-10 2016-09-20 Gemalto Sa Secure registration of group of clients using single registration procedure
FR2990094A1 (en) * 2012-04-26 2013-11-01 Commissariat Energie Atomique METHOD AND SYSTEM FOR AUTHENTICATING NODES IN A NETWORK
JP2014209677A (en) * 2013-04-16 2014-11-06 株式会社東芝 Data management device, power consumption calculation system, data management method, and data management program

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971397A (en) * 2018-09-28 2020-04-07 华为技术有限公司 Communication method, communication device, server and system
CN110971397B (en) * 2018-09-28 2021-09-14 华为技术有限公司 Communication method, communication device, server and system
CN113302895A (en) * 2018-11-23 2021-08-24 泰雷兹数字安全法国股份有限公司 Method and apparatus for authenticating a group of wireless communication devices
CN113302895B (en) * 2018-11-23 2023-04-18 泰雷兹数字安全法国简易股份公司 Method and apparatus for authenticating a group of wireless communication devices
CN116743413A (en) * 2022-10-26 2023-09-12 荣耀终端有限公司 Internet of things equipment authentication method and electronic equipment

Also Published As

Publication number Publication date
WO2016171618A1 (en) 2016-10-27
SG10201503071UA (en) 2016-11-29

Similar Documents

Publication Publication Date Title
CN105516195B (en) A kind of security certification system and its authentication method based on application platform login
CN109936547A (en) Identity identifying method, system and calculating equipment
CN104917766B (en) A kind of two-dimension code safe authentication method
CN106789047A (en) A kind of block chain identification system
CN104756458B (en) For protecting the method and apparatus of the connection in communication network
CN105991285A (en) Identity authentication methods, devices and system applied to quantum key distribution process
CN106779716A (en) Authentication method, apparatus and system based on block chain account address
CN107124433A (en) Internet of things system, internet of things equipment access method, access authorization methods and equipment
CN110247881A (en) Identity identifying method and system based on wearable device
CN101292496A (en) Method and devices for carrying out cryptographic operations in a client-server network
CN105164689A (en) User authentication
CN103853950A (en) Authentication method based on mobile terminal and mobile terminal
CN107251520A (en) Method for the polymerization authentication protocol in M2M communication
CN106060073B (en) Channel key machinery of consultation
CN106850207A (en) Identity identifying method and system without CA
CN109347875A (en) Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things
CA2969332A1 (en) A method and device for authentication
CN110493162A (en) Identity identifying method and system based on wearable device
CN108322416A (en) A kind of safety certification implementation method, apparatus and system
CN106209811A (en) Bluetooth equipment secure log auth method and device
CN108024243A (en) A kind of eSIM is caught in Network Communication method and its system
CN107612949A (en) A kind of intelligent wireless terminal access authentication method and system based on radio-frequency fingerprint
CN109272314A (en) A kind of safety communicating method and system cooperateing with signature calculation based on two sides
US20120284787A1 (en) Personal Secured Access Devices
CN106034122A (en) Information processing method, electronic equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20171013

WW01 Invention patent application withdrawn after publication