A kind ofly provide end to carry out the method for identification authentication to information
Technical field
The present invention relates to the data security technical field, being meant especially a kind ofly provides end to carry out the method for identification authentication to information.
Background technology
At mobile communication third generation partner program (3GPP, 3rd Generation PartnershipProject) location service (LCS, Location Service) in, can provide the respondent of data such as certain information and resource to be commonly referred to information end is provided, and provide the visitor of data such as end solicited message and resource to be commonly referred to the message reference end to information.The message reference end provides information that the positional information of end is provided to the request of LCS network system, the LCS network system obtains provides the geographical location information at end place to offer the message reference end as a kind of resource information after information provides the end agreement, like this, the message reference end just can obtain the positional information that information provides end by the LCS network system.Wherein, the technical specification TS22.071 of 3GPP has defined the business norms of LCS, and TS 23.271 has defined the aspects such as functional mode, system configuration, state description and message flow of LCS whole system.In described TS 23.271 standards, it is exactly target UE (Target UE, Target User Equipment) that information provides end, the UE that promptly is positioned.
Proposing at present message reference end solicited message among TS 22.071 and the TS 23.271, to provide the mode of the positional information of end to have following several: 1) type position requests immediately: information provides end to make an immediate response message reference end request position information after, and promptly information provides end that self current position information just is provided immediately after the message reference end sends position requests; 2) delaying type position request: the request of message reference end be that information provides end at time point in the future, positional information when perhaps certain incident takes place, promptly after the message reference end sent position requests, information provided end that self current position information is provided after delay after a while again; 3) preiodic type position requests: the periodic solicited message of message reference end provides end position information, be start time point of message reference end definition and concluding time point and certain periodicity logic, require information to provide end to provide its positional information according to the periodicity logic in the period at this section.
Thus, the purposes of LCS is exactly the message reference end provides the positional information of end by solicited message, provides the position of end to determine or follow the tracks of to information.Permission information provides the effective position requests that current activation was inquired about, cancelled to end at any time in TS 22.071, cancels the request of message reference end to its positional information; Simultaneously stipulated that also information provides the function that end can activate or the deexcitation positional information provides, whether the positional information of self outwards is provided with decision; In addition, stipulated that also information provides end that inquiry is arranged or revises the function that self user data is provided with.
But not proposition information provides end to provide the end identity legitimacy to carry out the security mechanism of authentication to information when inquiring about, cancelling the location information request of message reference end in TS 22.071.If this moment, information was stolen end, i.e. the stealer of data such as information and resource, the information of having stolen provides the certain information of end and is enough to control information when end is provided, and information is stolen end also can inquire about or cancel the message reference end provides end position information to information request.So, when the information that will cause the message reference end to provide end to provide according to information is monitored,, information can not reach the purpose of monitoring because stealing illegally involving in of end.
Equally, in TS 22.071, also do not provide end to activate or the operation of himself positional information of deexcitation provides any safety measure to information, so, when information is stolen end and has been stolen information and certain information of end is provided and can control information provides end, information is stolen end and also can be finished and activate or the function that provides of end position information is provided deexcitation information, causing provides client information that the interference of normal activation or deexcitation is provided to information, destruction information provides end to provide situation to external information, causes information to provide end and the visit of message reference client information alternately unusually.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of provides end to carry out the method for identification authentication to information when providing end to initiate operation to information, make information provide end when the information of carrying out such as provides at associative operation, have authentication mechanism to carry out safety guarantee, information provides end to be controlled by malice to prevent information from providing client information to be stolen afterwards.
Realize the present invention, need following steps:
The operation that provides end to initiate to information is set in the network system that location service LCS is provided carries out the information of identification authentication; This method is further comprising the steps of: after information provides end to initiate operation requests, the identification authentication information that network system is initiated solicit operation according to set correspondence determines that information provides the end identity whether legal, the information legal to identity provides end, and network system execution information provides end to initiate requested operation.
Wherein, describedly the operation that provides end to initiate to information is set carries out the information of identification authentication and be: provide end to be provided with by information and self initiate the corresponding identification authentication information of each operation, and with set identification authentication information stores in network system.
Wherein, information provides end to be the different identical identification authentication information of initiation operation setting, or information provides end to initiate the different identification authentication information of operation setting for each.
Wherein, this method further comprises: for each identification authentication information of initiating operation setting can provide end to change at any time by information.
Wherein, described network system determines information to provide the end identity, and whether legal step comprises: information provides end that the required identification authentication information of current initiation operation is offered network system, and network system compares the identification authentication information that information provides the corresponding current initiation that is provided with in identification authentication information that end provides and the network system to operate definite.
Wherein, the operation that described information provides end to initiate comprises: inquiry or cancellation message reference end provide the request of end position information to information, activate or providing of end self-position information is provided deexcitation information, and inquiry or modification information provide the user data setting of end.
Wherein, this method further comprises: information provides end that each operation is set in advance identification authentication information, and network system is finished storage to set identification authentication information by the authentication information memory function module; After information provided end that the identification authentication information of current operation is provided, network system was finished by authentication information authentication function module the checking of this identification authentication information is compared; After authentication is passed through, the subsequent operation after network system is carried out functional module and finished authentication and pass through by operation.
Wherein, this method further comprises: when network system determined that information provides the identity of end legal, network system provided end to send authentication success information to information.
Wherein, this method further comprises: network system determines that information provides the identity of end illegal, and network system refusal execution information provides the end requested operation.
Wherein, network system refusal execution information comprises further when the end requested operation is provided that network system provides end to return miscue information to information.
Wherein, described information provides end to be target UE.
By said method as can be seen, the method that authentication is provided when providing end to initiate operation to information provided by the present invention, when information provides the end associative operation that the information of carrying out provides, having increased provides end to carry out the security mechanism of identification authentication to information, the information that prevented is stolen end and carry out malicious operation after steal information is provided certain information of end and resource and control information that end is provided, avoided information to steal that end disturbs or destruction information provides end external information is provided or the message reference end provides the location information access of end to information, monitoring etc., the information that improved provides the positional information mutual fail safe of end with the message reference end.
Description of drawings
Fig. 1 finishes the realization flow figure of authentication operations for information of the present invention provides end.
Fig. 2 is for supporting the building-block of logic of the embodiment of authentication operations network side among the present invention.
Embodiment
Below by specific embodiment with reference to accompanying drawing, the present invention is described in more detail.
To be applied in the LCS network is example, the present invention is before realizing authentication mode, need information to provide end that identification authentication information used when carrying out every kind of operation is set in the LCS network system in advance, every kind of corresponding identification authentication information of operation of set initiation can be the same or different.The LCS network system is stored all identification authentication information that this information provides end to be provided with, and permission information provides end at any time this authentication information to be changed.
Fig. 1 finishes the realization flow figure of authentication operations for information of the present invention provides end, and as shown in Figure 1, it is as follows that information provides end and network to carry out mutual process:
Step 101: when information provided end to initiate certain operation, information provided end to LCS network system transmit operation request, and the LCS network system receives that this request back responds this operation, activates the flow process of differentiating this operation validity.
Step 102~103:LCS network system provides end to send out the authentication information request to information, requirement information provides end to provide and carries out the required identification authentication information of current operation, information sends to the LCS network system with the pairing identification authentication information of current operation after providing end to receive password request.
After step 104~105:LCS network system receives that information provides the identification authentication information sent of end, authentication information provides the legitimacy of end identity, that is: provide end in the LSC network system, to be provided with the identification authentication information received and information in advance and the identification authentication information of storing compares, if relatively by being the authentication success, then network provides end to return the prompting successful information to information, and carry out the operation requests that corresponding information provides end, network can not provide end to return the authentication successful information to information yet, and directly carries out the operation requests that corresponding information provides end.Otherwise, failed authentication is described, network refusal information provides the operation requests of end, to providing end to return corresponding error responses information.
Authentication mechanism when providing end to initiate operation for realization information should comprise three functional modules in the LCS network system at least: functional module is carried out in authentication information authentication function module, authentication information memory function module and operation.These three functional blocks can exist in the LCS network system as independent entity respectively, also can be used as three independently functional module be integrated in the entity in the LCS network system or be arranged at respectively in a plurality of entities.Fig. 2 is for supporting an embodiment building-block of logic of authentication operations network side among the present invention, as shown in Figure 2, in the present embodiment, authentication information checking, authentication information storage and operation are carried out three functional modules and be respectively three independent entity, promptly are respectively: server is carried out in authentication information authentication server, authentication information storage server and operation.Wherein, the authentication information authentication server is used for providing end to initiate to carry out when certain is operated identification authentication to information; The authentication information storage server is used for stored information provides relevant identification authentication information required when holding certain operation of carrying out that is provided with; Certain operation that server execution information provides end to initiate is carried out in operation.
When information provides end to carry out certain operation, the authentication information authentication server compares the corresponding identification authentication information that information provides the identification authentication information that provides of end and authentication information storage server to store, when the relevant identification authentication information of authentication information storage server storage and information provide when holding the identification authentication information that provides identical, the authentication information authentication server accepts request, and notifying operation is carried out the relevant subsequent operation of server execution; Otherwise authentication information authentication server refusal is asked, and provides end to return corresponding error responses information to information.
When providing end inquiry or cancellation message reference end, information information is provided the request of end position information, when providing of end self-position information is provided for activation or deexcitation information, the LCS network system is in the response inquiry, cancellation, before the operation requests of activation or deexcitation, all require information to provide end to provide the current request operation corresponding identification authentication information, such as: require the required authentication password of input inquiry operation, the authentication password that the cancellation operation is required, the authentication password that authentication password that activation manipulation is required or deactivating operation are required etc., network compares the password to should operate of the operator password of current input with storage in advance, judge that information provides the identity of end whether legal, whether carry out this operation with decision.
The above embodiment mainly discloses the mode that accesses to your password provides the end identity legitimacy to carry out the method for authentication to information, for the mode of other authentications, as end certain specific database of visit being provided by LCS network system requirement information and providing proof of identification to carry out authentication; Perhaps the LCS network system needs information to provide the user of end to show corresponding proof of identification to some specific places to carry out methods such as authentication and no longer describe in detail.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.