CN1756428A - Method for carrying out authentication for terminal user identification module in IP multimedia subsystem - Google Patents

Method for carrying out authentication for terminal user identification module in IP multimedia subsystem Download PDF

Info

Publication number
CN1756428A
CN1756428A CN200410084842.6A CN200410084842A CN1756428A CN 1756428 A CN1756428 A CN 1756428A CN 200410084842 A CN200410084842 A CN 200410084842A CN 1756428 A CN1756428 A CN 1756428A
Authority
CN
China
Prior art keywords
cscf
tlv triple
user identification
authentication
identification module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200410084842.6A
Other languages
Chinese (zh)
Other versions
CN100384120C (en
Inventor
谢红
王金城
朱东铭
顾炯炯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2004100848426A priority Critical patent/CN100384120C/en
Publication of CN1756428A publication Critical patent/CN1756428A/en
Application granted granted Critical
Publication of CN100384120C publication Critical patent/CN100384120C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method to identify terminal user identification module in IP multimedia subsystem, which comprises: after receiving register request from UE, IMS determines the UE's triple identification vector composed of at least RAND and SRES, keeps SRES and sends RAND to UE; UE transmits RAND to its identification module for calculating and returning RES to IMS; IMS decides whether SRES and RES same; if yes, passes the identification; or else, fails. This invention realizes identification without ISIM, decreases spread difficulty for IM business, and changes a little to existing network.

Description

In the IP Multimedia System terminal user identification module is carried out the method for authentication
Technical field
The present invention relates to authentication techniques, relate in IP Multimedia System (IMS), terminal user identification module be carried out the method for authentication or rather portable terminal.
Background technology
Along with the development of multimedia service, the multimedia service at portable terminal has appearred at present.Now the IMS system that provides multimedia service for portable terminal as shown in Figure 1, originally this system is a subdomain that superposes outside the existing packet domain of third generation network (3G), this subdomain is specifically designed to the support IP multimedia service.Under the situation of condition maturity, the IMS system also can serve the user that terminal local area network (LAN) (WLAN) waits other modes to insert.
The IMS system mainly is made of controlling call entity and media gateway parts, the main Session Initiation Protocol control channel that uses between each parts.Call control department spare is mainly finished the functions such as mobility of calling out control, address transition, charging, hidden portable terminal (UE), is the critical component in the IMS system; The media gateway parts are then for introducing with existing Public Switched Telephone Network (PSTN) Web-compatible.In addition, the home subscriber server (HSS) in the IMS system is the equipment that is used to preserve the IMS user signing contract information in the home network.
The safety of IMS system comprises that the user is in the authentication of IMS system and the protection of sip message.The security architecture of IMS system as shown in Figure 2.Wherein, authentication between UE and the home network and Security Association (SA:Security Association) consult to adopt IMS KI agreement (AKA) bidirectional authentication mechanism, and what the encryption of sip message and integrity protection adopted is the hop-by-hop processing mode.
Specifically, in the IMS system, for realizing the authentication to IP multimedia (IM) user, the 3GPP agreement organizations has been used the authentication module of special IMS Subscriber Identity Module (ISIM) module as user side, and has used the AKA mechanism of universal mobile telecommunications system (UMTS).The IMS system to user's authentication process process as shown in Figure 3, corresponding following steps:
When step 301, UE use IMS professional at needs, expand controlled function (I_CSCF) by agency-CSCF (P_CSCF) and inquiry-calling successively register requirement is sent to service call State Control function (S_CSCF).
Step 302, S_CSCF if there is the five-tuple authentication vector (AV) at this user in self, then directly utilize this authentication vector that the user is carried out authentication after receiving register requirement, promptly enter step 304; If no, then to HSS request AV.
Here, five-tuple AV comprises: encryption key (CK), Integrity Key (IK) and intended response (XRES) that random number (RAND), authentication-tokens (AUTN), global mobile communication net use.
After step 303, HSS receive the request of S_CSCF, determine five-tuple AV, and send to S_CSCF.
Certainly, for raising the efficiency, HSS generally can send many group five-tuple AV to S_CSCF in order.
XRES among the five-tuple AV that step 304, S_CSCF reservation HSS send is placed on RAND, AUTN, CK and IK in authentication test (Autn_Challenge) message, and this message is sent to P_CSCF by I_CSCF.
If HSS sends many group five-tuple AV, then S_CSCF can select one group of five-tuple AV in order, and other five-tuples AV then stays in the authentication next time at this user and uses.
Step 305, P_CSCF keep CK and the IK that S_CSCF sends by Autn_Challenge message, and RAND and AUTN are issued to UE.
If system start-up consistency protection and privacy protection, IK under then P_CSCF will use in follow-up session and preserve and CK are as key.
Step 306, UE send to ISIM with RAND and the AUTN that receives.
Step 307, ISIM verify the AUTN that receives, and verifying by the back according to RAND calculated response (RES), then the RES that calculates is sent to UE as Authentication Response, and this RES is returned to S_CSCF by UE, ISIM also calculates IK and CK according to RAND simultaneously, and IK and CK are sent to UE.
ISIM verifies to comprise determining whether the MAC value that comprises among the AUTN is legal to the AUTN that receives, and whether definite SQN can accept.Wherein, whether whether acceptable checking is checking to ISIM need synchronous again to SQN.
UE specifically can send to S_CSCF with RES by P_CSCF and I_CSCF, and keeps IK and CK, with as the key in the subsequent session.
RES in the Authentication Response that UE is sent in step 308~309, S_CSCF and the XRES that self preserves compare, if equate, determine that then authentication passes through, and send the authentication success message by I_CSCF and P_CSCF to UE; Otherwise, determine failed authentication.
Above-mentioned processing procedure requires to use independent ISIM module to finish the authentication in IM territory, that is to say, at present set ISIM module is to be specifically designed to the authentication that realizes the IM territory, and the terminal user identification module that can be used in 3G at present all is not comprise the ISIM module, so these terminal user identification modules can't be finished the authentication in IM territory by said process.Such as, the user uses Subscriber Identity Module (SIM) card based on the GSM/GPRS network at present mostly, even subnetwork has been upgraded to 3G network, because UE has realized the bimodulus application, therefore the user still can insert the 3G system by SIM card, in this case, owing to do not have the ISIM module in the SIM card, therefore can't finish the authentication in IM territory by above-mentioned processing procedure.For another example, the UICC card at 3G that has occurred has at present generally only comprised the USIM module that is used for CS territory and PS territory authentication, so also just can't finish the authentication in IM territory by above-mentioned processing procedure.
If need not above-mentioned processing procedure finish authentication to the IM territory based on the ISIM module, but wish to realize authentication by the USIM module, then can occur when realizing CS territory or PS territory authentication, authentication being carried out in the IM territory and cause frequent synchronous again problem because of the USIM module.What is called is meant synchronously again: preserved SQN in the USIM module MSIf the SQN in the five-tuple that HSS/HLR issues is than the SQN that preserves in the USIM module MSOld, and the SQN that issues is the SQN that preserves with HSS/HLR HEBe as the criterion, this illustrates SQN HECompare SQN MSOld, use the SQN of self so will cause the USIM module MSSQN among the HSS/HLR desynchronizes HE
Specifically, be to improve the access efficiency of network,, and when asking for authentication vector, all can ask for many groups at the S_CSCF in IM territory at the VLR in CS territory, at the SGSN in PS territory, each only use wherein one group to carry out authentication process, and from the remaining authentication vector of row cache.In this case, if the operation frequency difference in each territory, such as, SGSN and VLR have successively obtained 5 groups of authentication tuples to HSS, using separately after one group, may make that 4 groups of residue authentication vector of buffer memory will be than the SQN in the USIM module among the SGSN because the user is very frequent in the operation in CS territory MSThe SQN old, that preserve in the USIM module this moment MSThe SQN that issues with VLR is as the criterion, and like this, the USIM module is just used the SQN of self MSSQN among the HSS/HLR desynchronizes HE, and then cause all authentication vector of SGSN/VLR current cache to lose efficacy.From above-mentioned example as seen, if the operation frequency of same area does not differ bigger, then will inevitably cause frequent synchronous again.
For solving above-mentioned frequent synchronous again problem, can substitute all HLR in the existing network with HSS, because HSS can be divided into the SQN that issues CS territory, PS territory and IM territory, like this, the USIM module can compare the SQN in each territory respectively, as long as can guarantee that the pairing SQN of authentication tuple that HSS is handed down to each territory is orderly, just can not cause unnecessary synchronizing process again.Owing to all have only a network entity to be used for buffer memory authentication tuple in each territory, such as, have in the CS territory in VLR buffer memory, the PS territory SGSN buffer memory is arranged, the S_CSCF buffer memory is then arranged in the IM territory, therefore can solve stationary problem again to the division of SQN by HSS.
But, because present network is in the starting stage, extensive replacement HLR is impossible basically, more rational solution is the one or more HSS that the IM business is provided specially of stack on the basis of existing network, and existing HLR remains unchanged, continue to provide the business in CS and PS territory, HSS then by with existing network in the CS/PS information of obtaining the user alternately of HLR.Under this networking situation, USIM can be shared in newly-increased IM territory and existing CS/PS territory, and the HSS in IM territory can obtain authentication vector from the HLR of user attaching, but because HLR can't be divided into the SQN that issues CS territory, PS territory and IM territory, therefore frequent synchronous again problem does not still solve.
In addition, superpose when building the IMS system,, therefore need the HLR of existing network and the HSS that increases newly to share same AUC owing to need carry out verification to SQN if adopt on existing network, bigger to the influence of existing network.
From the above description as can be known, wanting in the SIM card to realize the IM business, perhaps use usim card to realize that IM is professional and frequent synchronous again problem can not occur, is exactly to be the card that comprises the ISIM module with card replacement according to the proposed projects of 3GPP at present.According to present operation mode,, can realize by all means that interface upgrade of purchasing new machine, providing by Java or mobile-phone manufacturers etc. is provided, these upgradings have very strong operability if the user wants the UE that upgrades.If but the user wants to change card, then must change to the special agency that operator is authorized, and be to guarantee professional continuation, IMSI in IMSI in the neocaine and the old card must guarantee certain relevance, such as, must belong to same HLR, therefore, change when being stuck in practical operation inevitable very loaded down with trivial details.
In sum, want to use the IM business at present, then must comprise the ISIM module in user's the terminal user identification module, obviously this than higher, the SIM card or the usim card that often need the user to change self could be realized to the requirement of terminal user identification module.Be stuck in the practical operation very loaded down with trivial detailsly and change, will inevitably reduce the attraction of IM business greatly, increase the difficulty that operator promotes the IM business.
Summary of the invention
In view of this, main purpose of the present invention is to be provided at the method for in the IMS system terminal user identification module being carried out authentication, so that the user need not change the terminal user identification module of self, can use the IM business in the 3G system.
For reaching above purpose, technical scheme of the present invention is achieved in that a kind of method of terminal user identification module being carried out authentication in IP Multimedia System, and this method may further comprise the steps:
The a.IP multimedia subsystem, IMS is after receiving the register requirement that mobile terminal UE is sent, determine tlv triple authentication vector at this UE, described tlv triple authentication vector comprises random number RA ND and symbol response SRES at least, keeps the SRES in the tlv triple, and RAND is issued to UE;
B.UE is sent to described RAND the terminal user identification module of self;
C. terminal user identification module calculates RES according to RAND, and RES is returned to the IMS system by UE;
The d.IMS system judges whether the RES that UE returns equates with the SRES that self preserves, if then authentication is passed through, otherwise, failed authentication.
Among the described step a, the definite tlv triple authentication vector at UE of described IMS system comprises: the S_CSCF in the IMS system judges the tlv triple authentication vector that self whether has at this UE, if then carry out subsequent step; Otherwise, to the tlv triple authentication vector of home subscriber server HSS request at this UE;
HSS determines the tlv triple authentication vector at this UE, and sends to S_CSCF after receiving the authentication vector request that S_CSCF sends.
Terminal user identification module among the described UE is Subscriber Identity Module SIM, and described HSS directly determines the tlv triple authentication vector at sim module among this UE.
Terminal user identification module among the described UE is user's service identifiers module USIM;
Described HSS determines to comprise at the tlv triple authentication vector of UE: HSS at first determines the five-tuple authentication vector at the USIM module, and described five-tuple authentication vector is converted to the tlv triple authentication vector.
Described tlv triple authentication vector further comprises: Kc; Described five-tuple authentication vector comprises: RAND, XRES, IK, CK and AUTN; Describedly the five-tuple authentication vector is converted to the tlv triple authentication vector is: abandon the AUTN in the five-tuple, keep RAND, XRES is converted to SRES, and IK and CK are converted to Kc.
Among the described step c, described terminal user identification module calculates RES according to RAND and comprises: the USIM module is according to whether receiving that AUTN judges whether five-tuple is converted to tlv triple, such as judging whether to need to start the 3G+Kc pattern, if do not receive AUTN, then start the 3G+Kc pattern, and calculate XRES according to RAND, XRES is converted to SRES; If receive AUTN, then do not start the 3G+Kc pattern, and finish this handling process.
Among the described step a, the IMS system is issued to UE with RAND and is: S_CSCF is issued to UE by I_CSCF and P_CSCF with RAND;
Among the step c, described terminal user identification module returns to the IMS system with RES by UE and is: terminal user identification module sends to UE with RES, and UE sends to S_CSCF with described RES by agent call State Control function P_CSCF and I_CSCF again.
Consistency protection and privacy protection are enabled by described system; And further comprise Kc in the described tlv triple;
Described step a further comprises: the S_CSCF in the IMS system is converted to CK and IK with the Kc in the tlv triple, and described CK and IK are sent to P_CSCF by I_CSCF;
Described step c further comprises: terminal user identification module calculating K c, and described Kc is uploaded to UE;
This method further comprises: the Kc that UE uploads terminal user identification module is converted to IK and CK; UE and P_CSCF with described IK and CK as the key in the subsequent session.
Consistency protection and privacy protection are enabled by described system;
Described step a further comprises: the S_CSCF in the IMS system directly sends to P_CSCF by I_CSCF with the Kc in the tlv triple;
Described step c further comprises: terminal user identification module calculating K c, and described Kc is uploaded to UE;
This method further comprises: the Kc that P_CSCF and UE receive self is converted to CK and IK; UE and P_CSCF and with described IK and CK as the key in the subsequent session.
Described terminal user identification module is the USIM module;
Among the step c, described terminal user identification module calculating K c further comprises: the USIM module does not receive that in basis AUTN determines that needs are converted to tlv triple with five-tuple, after needs startup 3G+Kc pattern, calculate IK and CK according to RAND, and IK and CK be converted to Kc, afterwards described Kc is sent to UE.
The present invention program uses the tlv triple authentication vector that terminal user identification module is carried out authentication by the IMS system, when having realized using existing sim module or USIM module to carry out authentication, also avoided of the verification of USIM module to SQN, then make on the existing network basis newly-built HSS do not need with existing network in HLR share same AUC, that is to say, can AUC be set separately at HSS, thereby make in existing network when increasing HSS, do not need because of authentication problem any existing existing network equipment of upgrading.
By the present invention program, make and use the user such as sim module, USIM module not need to upgrade or change card and can enjoy the IM business, greatly reduce the popularization difficulty of IM business.
In addition, all modifications that the present invention program is related and transformation all are to realize in the related network entity in IM territory, for all devices among present GSM, GPRS and the UMTS all without any extra demand, making on existing network one of stack be specifically designed to provides the IMS in IM territory system to become possibility.
Description of drawings
Fig. 1 is present IMS system configuration schematic diagram;
Fig. 2 is the security architecture schematic diagram of IMS;
Fig. 3 carries out the message flow sequential chart of authentication to UE by ISIM for IMS system in the prior art;
Fig. 4 carries out the message flow sequential chart of authentication to UE by SIM for IMS system among the present invention;
Fig. 5 carries out the message flow sequential chart of the another kind of scheme of authentication to UE by SIM for IMS system among the present invention;
Fig. 6 carries out the message flow sequential chart of authentication to UE by USIM for IMS system among the present invention;
Fig. 7 carries out the message flow sequential chart of the another kind of scheme of authentication to UE by USIM for IMS system among the present invention.
Embodiment
Because processing procedure shown in Figure 3 need be verified AUTN, for sim module and USIM module, checking AUTN can bring frequent synchronous again problem, therefore, core concept of the present invention is: when S_CSCF carries out authentication at needs to UE, utilize the tlv triple authentication vector do not comprise AUTN to carry out authentication and avoid verification to SQN.Like this, the HSS authentication vector that sends to S_CSCF also should be tlv triple.
Be example with SIM and USIM as terminal user identification module respectively below, in conjunction with the accompanying drawings the present invention program done detailed explanation.
Figure 4 shows that SIM card inserts the authentication process process in IM territory, corresponding following steps:
When step 401, UE use IMS professional at needs, by P_CSCF and I_CSCF register requirement is sent to S_CSCF successively.
Step 402, S_CSCF judge the tlv triple AV that self whether exists at this user after receiving register requirement, if exist, then directly utilize this AV that the user is carried out authentication, promptly enter step 404; If there is no, then to HSS request AV.
Here, tlv triple AV comprises: RAND, symbol response SRES and Kc.
Step 403, HSS determine the tlv triple AV at this sim module, and send to S_CSCF after the request of receiving S_CSCF.
Because SIM itself just supports tlv triple AV, so HSS can directly determine the tlv triple AV at this SIM.
In addition, for raising the efficiency, HSS generally can send many group tlv triple AV to S_CSCF in order.
Step 404, S_CSCF keep the SRES among the tlv triple AV that HSS sends, and use canonical algorithm that Kc is converted to CK and IK, afterwards RAND and the CK that is converted to and IK are sent to P_CSCF by Auth_Challenge message.
If that HSS sends is many group tlv triple AV, then S_CSCF can select one group of AV in order, and other AV then stay in the authentication next time at this user and use.
Step 405, P_CSCF keep CK and the IK that S_CSCF sends by Auth_Challenge message, and RAND is issued to UE.
If system start-up consistency protection and privacy protection, IK under then P_CSCF will use in follow-up session and preserve and CK are as key.
Step 406, UE send the RAND that receives to SIM.
Step 407, SIM calculate RES and Kc according to RAND after receiving RAND, and RES is returned to S_CSCF as Authentication Response by UE, simultaneously Kc are uploaded to UE.
UE specifically can send to S_CSCF by P_CSCF and I_CSCF with the Authentication Response that SIM returns successively.
RES in the Authentication Response that UE is sent in step 408~409, S_CSCF and the SRES that self preserves compare, if equate, determine that then authentication passes through, and send the authentication success message by I_CSCF and P_CSCF to UE; Otherwise, determine failed authentication.
Can realize authentication by above-mentioned processing procedure to SIM.Certainly, if system start-up consistency protection and privacy protection, then UE also needs the Kc that SIM sends is converted to IK and CK, with Integrity Key and the Integrity Key as subsequent session.
In above-mentioned processing procedure, the transfer algorithm that S_CSCF and UE use can be tlv triple and a five-tuple transfer algorithm given among the 3GPP TS33.102, thereby improves versatility.
For process, can also realize by process shown in Figure 5 at the SIM card authentication.This process is compared with above-mentioned process shown in Figure 4, the step 501 among Fig. 5~503, and step 506~509 are identical with corresponding steps among Fig. 4, its main distinction is:
In step 504, S_CSCF does not change Kc, but directly Kc is sent to P_CSCF by Auth_Challenge message.
In step 505, that P_CSCF keeps is the Kc that S_CSCF sends by Auth_Challenge message.Certainly, if system start-up consistency protection and privacy protection, then P_CSCF also needs to use canonical algorithm that this Kc is converted to CK and IK, and the IK under use preserving in follow-up session and CK are as key.
Above-mentionedly process by the SIM authentication is described in conjunction with Fig. 4 and Fig. 5, for the process of carrying out authentication by USIM, then as shown in Figure 6, corresponding following steps:
When step 601, UE use IMS professional at needs, by P_CSCF and I_CSCF register requirement is sent to S_CSCF successively.
Step 602, S_CSCF judge the tlv triple AV that self whether exists at this user after receiving register requirement, if exist, then directly utilize this AV that the user is carried out authentication, promptly enter step 404; If there is no, then to HSS request tlv triple AV.
Here, tlv triple AV comprises: RAND, SRES and Kc.
Step 603, HSS are after the request of receiving S_CSCF, determine the five-tuple AV corresponding with this USIM, this five-tuple AV comprises RAND, XRES, IK, CK and AUTN, re-use the standard handovers algorithm this five-tuple AV is converted to corresponding tlv triple AV, this tlv triple AV comprises RAND, SRES and Kc, and the tlv triple AV with gained is handed down to S_CSCF then.
Because USIM itself does not support tlv triple AV, so HSS need at first determine to be converted into corresponding tlv triple AV again by the five-tuple AV that USIM is supported.Main conversion work is: keep original RAND, abandon AUTN, XRES is converted to SRES, and IK and CK are converted to Kc.
In addition, for raising the efficiency, HSS generally can determine a plurality of five-tuple AV, and each five-tuple AV is converted to corresponding tlv triple AV, and then the tlv triple AV that is converted to is sent to S_CSCF in order.
Step 604, S_CSCF keep the SRES among the tlv triple AV that HSS sends, and use canonical algorithm that Kc is converted to CK and IK, afterwards RAND and the CK that is converted to and IK are sent to P_CSCF by Auth_Challenge message.
Certainly, if HSS sends is many group tlv triple AV, then S_CSCF can select one group of AV in order, and other AV then stay in the authentication next time at this user and use.
Step 605, P_CSCF keep CK and the IK that S_CSCF sends by Auth_Challenge message, and RAND is issued to UE.
If system start-up consistency protection and privacy protection, IK under then P_CSCF will use in follow-up session and preserve and CK are as key.
Step 606, UE send the RAND that receives to USIM.
Step 607, USIM are after receiving RAND, after determining that according to AUTN needs are converted to tlv triple with five-tuple, utilize RAND to calculate XRES, IK and CK, and then use transfer algorithm that XRES is converted to RES, IK and CK are converted to Kc, and described RES returned to S_CSCF as Authentication Response by UE, simultaneously the Kc that is converted to is uploaded to UE.
Wherein, USIM determines that according to AUTN needs are converted to tlv triple with five-tuple, can be to determine that according to AUTN needs start the 3G+Kc pattern.USIM determines whether that according to AUTN needs start the 3G+Kc pattern and are specially: USIM judges whether to receive AUTN, if receive AUTN, does not then start the 3G+Kc pattern, and handles according to original processing logic; If do not receive AUTN, then start the 3G+Kc pattern, carry out described subsequent processes afterwards.
UE specifically can send to S_CSCF by P_CSCF and I_CSCF with the Authentication Response that USIM returns successively.
RES in the Authentication Response that UE is sent in step 608~609, S_CSCF and the SRES that self preserves compare, if equate, determine that then authentication passes through, and send the authentication success message by I_CSCF and P_CSCF to UE; Otherwise, failed authentication.
Certainly, if system start-up consistency protection and privacy protection, then UE also needs the Kc that USIM sends is converted to IK and CK, with Integrity Key and the Integrity Key as subsequent session.
Equally, the employed transfer algorithm of above-mentioned processing can be tlv triple and a five-tuple transfer algorithm given among the 3GPP TS 33.102, thereby improves versatility.
For process, can also realize by process shown in Figure 7 at the usim card authentication.This process is compared with above-mentioned process shown in Figure 6, and the difference in its main distinction and the above-mentioned SIM card authentication process between Fig. 4 and the flow process shown in Figure 5 is identical.That is to say; S_CSCF can not change Kc, but directly sends to P_CSCF, if system start-up consistency protection and privacy protection; then P_CSCF also needs to use canonical algorithm that this Kc is converted to CK and IK, and with it as the key in the subsequent session.
The above only is the present invention program's preferred embodiment, not in order to limit protection scheme of the present invention.

Claims (10)

1, a kind of method of terminal user identification module being carried out authentication in IP Multimedia System is characterized in that, this method may further comprise the steps:
The a.IP multimedia subsystem, IMS is after receiving the register requirement that mobile terminal UE is sent, determine tlv triple authentication vector at this UE, described tlv triple authentication vector comprises random number RA ND and symbol response SRES at least, keeps the SRES in the tlv triple, and RAND is issued to UE;
B.UE is sent to described RAND the terminal user identification module of self;
C. terminal user identification module calculates RES according to RAND, and RES is returned to the IMS system by UE;
The d.IMS system judges whether the RES that UE returns equates with the SRES that self preserves, if then authentication is passed through, otherwise, failed authentication.
2, method according to claim 1, it is characterized in that among the described step a, the definite tlv triple authentication vector at UE of described IMS system comprises: the service in the IMS system-CSCF S_CSCF judges the tlv triple authentication vector that self whether has at this UE, if then carry out subsequent step; Otherwise, to the tlv triple authentication vector of home subscriber server HSS request at this UE;
HSS determines the tlv triple authentication vector at this UE, and sends to S_CSCF after receiving the authentication vector request that S_CSCF sends.
3, method according to claim 2 is characterized in that, the terminal user identification module among the described UE is Subscriber Identity Module SIM, and described HSS directly determines the tlv triple authentication vector at sim module among this UE.
4, method according to claim 2 is characterized in that, the terminal user identification module among the described UE is user's service identifiers module USIM;
Described HSS determines to comprise at the tlv triple authentication vector of UE: HSS at first determines the five-tuple authentication vector at the USIM module, and described five-tuple authentication vector is converted to the tlv triple authentication vector.
5, method according to claim 4 is characterized in that, described tlv triple authentication vector further comprises: the encryption key Kc that the global mobile communication net uses; Described five-tuple authentication vector comprises: RAND, intended response XRES, Integrity Key IK, encryption key CK and authentication-tokens AUTN;
Describedly the five-tuple authentication vector is converted to the tlv triple authentication vector is: abandon the AUTN in the five-tuple, keep RAND, XRES is converted to SRES, and IK and CK are converted to Kc.
6, method according to claim 4, it is characterized in that among the described step c, described terminal user identification module calculates RES according to RAND and comprises: whether USIM module basis receives AUTN judges whether that needs are converted to tlv triple with five-tuple, if do not receive AUTN, then determine and five-tuple need be converted to tlv triple, calculate XRES according to RAND, XRES is converted to SRES; If receive AUTN, then do not carry out conversion, and finish this handling process.
7, method according to claim 1 is characterized in that among the described step a, and the IMS system is issued to UE with RAND and is: S_CSCF is issued to UE by agent call State Control function P_CSCF with RAND;
Among the step c, described terminal user identification module returns to the IMS system with RES by UE and is: terminal user identification module sends to UE with RES, and UE sends to S_CSCF with described RES by P_CSCF again.
8, method according to claim 7 is characterized in that, consistency protection and privacy protection are enabled by described system; Further comprise Kc in the described tlv triple;
Described step a further comprises: the S_CSCF in the IMS system is converted to CK and IK with the Kc in the tlv triple, and described CK and IK are sent to P_CSCF;
Described step c further comprises: terminal user identification module calculating K c, and described Kc is uploaded to UE;
This method further comprises: the Kc that UE uploads terminal user identification module is converted to IK and CK; UE and P_CSCF with described IK and CK as the key in the subsequent session.
9, method according to claim 7 is characterized in that, consistency protection and privacy protection are enabled by described system;
Described step a further comprises: the S_CSCF in the IMS system directly sends to P_CSCF with the Kc in the tlv triple;
Described step c further comprises: terminal user identification module calculating K c, and described Kc is uploaded to UE;
This method further comprises: the Kc that P_CSCF and UE receive self is converted to CK and IK; UE and P_CSCF and with described IK and CK as the key in the subsequent session.
10, according to Claim 8 or 9 described methods, it is characterized in that described terminal user identification module is the USIM module;
Among the step c, described terminal user identification module calculating K c further comprises: the USIM module is not after basis receives that AUTN determines that needs are converted to tlv triple with five-tuple, calculate IK and CK according to RAND, and IK and CK are converted to Kc, afterwards described Kc is sent to UE.
CNB2004100848426A 2004-09-30 2004-09-30 Method for carrying out authentication for terminal user identification module in IP multimedia subsystem Expired - Fee Related CN100384120C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100848426A CN100384120C (en) 2004-09-30 2004-09-30 Method for carrying out authentication for terminal user identification module in IP multimedia subsystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100848426A CN100384120C (en) 2004-09-30 2004-09-30 Method for carrying out authentication for terminal user identification module in IP multimedia subsystem

Publications (2)

Publication Number Publication Date
CN1756428A true CN1756428A (en) 2006-04-05
CN100384120C CN100384120C (en) 2008-04-23

Family

ID=36689283

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100848426A Expired - Fee Related CN100384120C (en) 2004-09-30 2004-09-30 Method for carrying out authentication for terminal user identification module in IP multimedia subsystem

Country Status (1)

Country Link
CN (1) CN100384120C (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083838A (en) * 2007-06-29 2007-12-05 中兴通讯股份有限公司 HTTP abstract authentication method in IP multimedia subsystem
WO2009062415A1 (en) * 2007-11-14 2009-05-22 Huawei Technologies Co., Ltd. An authentication method for request message and the apparatus thereof
CN101106457B (en) * 2006-07-10 2010-05-12 华为技术有限公司 Method for identifying authentication mode of user terminal in IP multimedia subsystem network
CN101068196B (en) * 2006-05-01 2010-05-12 中兴通讯股份有限公司 Bluetooth mobile telephone switch-in bluetooth gateway service insertion controlling method
CN101466096B (en) * 2007-12-17 2010-07-21 大唐移动通信设备有限公司 Method and system for triggering synchronous failure of authentication process
CN101854630A (en) * 2010-05-25 2010-10-06 中兴通讯股份有限公司 Method, system and user equipment for realizing card authentication
CN102056171A (en) * 2009-11-10 2011-05-11 中国移动通信集团公司 Method, system and device for authentication of user card roaming in different networks
CN102378174A (en) * 2010-08-25 2012-03-14 大唐移动通信设备有限公司 Access method, device and system of user terminal of SIM (Subscriber Identity Module) card
CN101247630B (en) * 2007-02-14 2012-05-09 中国移动通信集团公司 System and method for implementing multimedia broadcasting service cryptographic key negotiation
CN101662768B (en) * 2008-08-28 2013-06-19 阿尔卡特朗讯公司 Authenticating method and equipment based on user identification module of personal handy phone system
CN103581154A (en) * 2012-08-08 2014-02-12 中国移动通信集团公司 Authentication method and device in system of Internet of Things
CN103581153A (en) * 2012-08-08 2014-02-12 中国移动通信集团公司 Encryption method and device in system of Internet of Things
CN101467471B (en) * 2006-06-09 2016-09-28 西门子公司 The method for multiple registration of multimodal communication terminal device
CN106657034A (en) * 2016-12-02 2017-05-10 中国联合网络通信集团有限公司 Service authentication method and authentication capability opening server
CN107005842A (en) * 2014-12-02 2017-08-01 华为技术有限公司 Method for authenticating, relevant apparatus and system in a kind of cordless communication network
CN110858969A (en) * 2018-08-23 2020-03-03 刘高峰 Client registration method, device and system
CN115022878A (en) * 2022-08-08 2022-09-06 中国电子科技集团公司第三十研究所 Method, apparatus and medium for takeover of selected VoLTE user

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI20000760A0 (en) * 2000-03-31 2000-03-31 Nokia Corp Authentication in a packet data network
US6859651B2 (en) * 2002-03-28 2005-02-22 Nokia Corporation Method and system for re-authentication in IP multimedia core network system (IMS)
US7269730B2 (en) * 2002-04-18 2007-09-11 Nokia Corporation Method and apparatus for providing peer authentication for an internet key exchange
DE10223248A1 (en) * 2002-05-22 2003-12-04 Siemens Ag Method for registering a communication terminal
ATE311716T1 (en) * 2002-06-07 2005-12-15 Siemens Ag METHOD AND DEVICE FOR AUTHENTICATING A SUBSCRIBER FOR USING SERVICES IN A WIRELESS LAN (WLAN)
CN1239009C (en) * 2002-08-07 2006-01-25 华为技术有限公司 Quick abstract identification method for IP multimedia domain user's call

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068196B (en) * 2006-05-01 2010-05-12 中兴通讯股份有限公司 Bluetooth mobile telephone switch-in bluetooth gateway service insertion controlling method
CN101467471B (en) * 2006-06-09 2016-09-28 西门子公司 The method for multiple registration of multimodal communication terminal device
CN101106457B (en) * 2006-07-10 2010-05-12 华为技术有限公司 Method for identifying authentication mode of user terminal in IP multimedia subsystem network
CN101247630B (en) * 2007-02-14 2012-05-09 中国移动通信集团公司 System and method for implementing multimedia broadcasting service cryptographic key negotiation
CN101083838A (en) * 2007-06-29 2007-12-05 中兴通讯股份有限公司 HTTP abstract authentication method in IP multimedia subsystem
CN101163010B (en) * 2007-11-14 2010-12-08 华为软件技术有限公司 Method of authenticating request message and related equipment
WO2009062415A1 (en) * 2007-11-14 2009-05-22 Huawei Technologies Co., Ltd. An authentication method for request message and the apparatus thereof
US9641324B2 (en) 2007-11-14 2017-05-02 Huawei Technologies Co., Ltd. Method and device for authenticating request message
CN101466096B (en) * 2007-12-17 2010-07-21 大唐移动通信设备有限公司 Method and system for triggering synchronous failure of authentication process
CN101662768B (en) * 2008-08-28 2013-06-19 阿尔卡特朗讯公司 Authenticating method and equipment based on user identification module of personal handy phone system
CN102056171A (en) * 2009-11-10 2011-05-11 中国移动通信集团公司 Method, system and device for authentication of user card roaming in different networks
CN101854630A (en) * 2010-05-25 2010-10-06 中兴通讯股份有限公司 Method, system and user equipment for realizing card authentication
WO2011147258A1 (en) * 2010-05-25 2011-12-01 中兴通讯股份有限公司 Card authenticating method, system and user equipment
CN102378174A (en) * 2010-08-25 2012-03-14 大唐移动通信设备有限公司 Access method, device and system of user terminal of SIM (Subscriber Identity Module) card
CN103581154A (en) * 2012-08-08 2014-02-12 中国移动通信集团公司 Authentication method and device in system of Internet of Things
CN103581154B (en) * 2012-08-08 2017-01-25 中国移动通信集团公司 Authentication method and device in system of Internet of Things
CN103581153A (en) * 2012-08-08 2014-02-12 中国移动通信集团公司 Encryption method and device in system of Internet of Things
CN107005842A (en) * 2014-12-02 2017-08-01 华为技术有限公司 Method for authenticating, relevant apparatus and system in a kind of cordless communication network
CN107005842B (en) * 2014-12-02 2019-12-24 华为技术有限公司 Authentication method, related device and system in wireless communication network
CN106657034A (en) * 2016-12-02 2017-05-10 中国联合网络通信集团有限公司 Service authentication method and authentication capability opening server
CN106657034B (en) * 2016-12-02 2020-09-25 中国联合网络通信集团有限公司 Service authentication method and authentication capability open server
CN110858969A (en) * 2018-08-23 2020-03-03 刘高峰 Client registration method, device and system
CN115022878A (en) * 2022-08-08 2022-09-06 中国电子科技集团公司第三十研究所 Method, apparatus and medium for takeover of selected VoLTE user
CN115022878B (en) * 2022-08-08 2022-11-11 中国电子科技集团公司第三十研究所 Method, apparatus and medium for takeover of selected VoLTE user

Also Published As

Publication number Publication date
CN100384120C (en) 2008-04-23

Similar Documents

Publication Publication Date Title
CN1310476C (en) Method for building session connection to wireless local network user
CN1852553A (en) Method for authenticating IP multi-media zone to terminal user mark module
CN1756428A (en) Method for carrying out authentication for terminal user identification module in IP multimedia subsystem
US8151325B1 (en) Optimizing device authentication by discovering internet protocol version authorizations
CN1645960A (en) Interactive method for re-selecting operating network to wireless local network
CN1549526A (en) Method for realizing radio local area network authentication
CN1870808A (en) Key updating method
CN1874217A (en) Method for determining route
CN101056456A (en) Method and secure system for authenticating the radio evolution network
CN1848994A (en) Method for realizing right discrimination of microwave cut-in global interoperating system
CN1870812A (en) Method for selecting safety mechanism of IP multimedia subsystem acess field
CN1859093A (en) Method for verifying user terminal in IP multimedia subsystem
CN1801815A (en) Method for realizing initial Internet protocol multimedia subsystem registration
CN1604520A (en) Control method for wireless communication system, wireless communication device, base station, and authentication device in communication system
CN1674497A (en) Certification method for WLAN terminal switching in mobile network
CN1283062C (en) Cut-in identification realizing method for wireless local network
EP2888913B1 (en) Access control for a wireless local area network
CN1878103A (en) Method for WiMAX network accessing Internet protocol multimedia subdomain
CN108307296B (en) System and method for providing differentiated services to user equipment in international locations
CN1870822A (en) Identification log-on method and device for access non IMS mobile terminal into IMS field
US20200077455A1 (en) Communication management and wireless roaming support
CN1859335A (en) Radio local network connecting gateway strategy loading method in radio local network
EP2486741B1 (en) System and method for managing security keys for multiple security contexts of a wireless user device to handover communications in a network
CN102892110A (en) Method and system for keeping consistency of user identifications of terminal in different networks
CN1794682A (en) Method of establishing safety channel in radio access network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080423