EP1754358A1 - Method for authenticating a communications unit while using a lasting programmed secret code word - Google Patents
Method for authenticating a communications unit while using a lasting programmed secret code wordInfo
- Publication number
- EP1754358A1 EP1754358A1 EP05717100A EP05717100A EP1754358A1 EP 1754358 A1 EP1754358 A1 EP 1754358A1 EP 05717100 A EP05717100 A EP 05717100A EP 05717100 A EP05717100 A EP 05717100A EP 1754358 A1 EP1754358 A1 EP 1754358A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- communication unit
- code word
- message
- cwd
- communications unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Definitions
- the invention relates to a method for authenticating a communication unit.
- a communication unit is a terminal device that is connected to a communication
- a communication unit is also a user interface, via which the user can exchange messages of a certain type over distances by using services of the communication network.
- the communications network 15 enables the user to access the services that are provided by the operator of the communications network and that are referred to as the ability of the communications network to transmit certain types of information, such as voice, images or data.
- a communication network such as: voice or video transmission, packet-oriented or connection-
- Such communication units that can be connected to any, locally different access points can be, for example, mobile telephones, portable computers - so-called laptops, mobile devices without a keyboard - so-called PDAs or mobile devices without full desktop functionality, but with a defined range of functions - all of these types of communication units for access to a communication network must be specially equipped with a network card or a cell phone module.
- SIM cards are modules that are inserted into a communication unit and are used to authenticate the user of the communication unit by entering a PIN code.
- Communication network is connected and whether this communication unit is authorized to use certain services.
- the invention is therefore based on the object of specifying a method with which a communication unit can be reliably identified.
- this object is achieved with a method for authenticating a communication unit, in which a secret code word is programmed into a permanent memory in order to reliably check the communication unit.
- the secret code word is used to generate a message which is transmitted to the service provider. This message can be used to check whether the communication unit authenticated with it is authorized to purchase the service. This ensures that the services of a communication network are only purchased with appropriate, suitable communication units that are approved by the communication network operator.
- the code word can advantageously be written in during the manufacture, delivery or configuration of the communication unit.
- the code word is device-specific, manufacturer-specific and is only made known to the manufacturer of the communication unit and the service provider. This reduces the risk of spying and manipulation by unauthorized third parties.
- the code word known only to the manufacturer and the service provider it can also be checked whether the communication unit is allowed to perform the respective service.
- An embodiment of the method is advantageous in that a variable component is used in addition to the code word when generating the message. This ensures that a message is generated for each authentication process of the communication unit that differs from the previously differentiated messages. If, for example, the time is used as a variable component, the period of validity of the message can also be restricted.
- Fig.l the schematic sequence of authentication of a communication unit in an exemplary communication network
- the exemplary communication network KN comprises access points ZPx, via which a communication unit KE can be connected to the communication network KN by logging on.
- Various services DNx are also provided by the communication network KN, which are understood to mean the ability of the communication network KN to transmit information of a certain type. These DNx services can be, for example: voice transmission, access to the Internet or company-internal data networks and packet-oriented data transmission, downloading of music and video data for a fee, which service providers make available on data storage devices, etc.
- a code word CWD is programmed into the permanent memory SP of the communication unit KE when the communication unit KE is manufactured. This code word CWD is preferably device-specific and known only to the manufacturer and the service provider, in order to reduce the risk of spying and manipulation by unauthorized third parties.
- a service DN1 of a communication network KN is now to be obtained, in a first step 1 the user registers with the communication unit KE at an access point ZPl at the communication network KN. With this registration, the communication unit KE is also identified. For this purpose, the communication unit KE creates a message NA by means of scattered storage according to the so-called MD5 hashing method MD5, which is used exclusively for the authentication of the communication unit KE and is also sent in step 1.
- MD5 hashing method MD5 which is used exclusively for the authentication of the communication unit KE and is also sent in step 1.
- the user ID BK which is used to log the user on to the access point ZPl of the communication network KN, a version CWDh of the code word CWD generated by the MD5 hashing method MD5 and a random value ZW as for FIG Example uses the time to prevent the message NA from being repeated and to limit the period of validity of the message NA.
- the code word CWDh generated according to the MD5 hashing method MD5 and the random value ZW are ideally defined as so-called hexadecimal strings. These are alphanumeric strings that only consist of the symbols 0 to 9 and A to F.
- the user ID BK which is based on the MD5 hashing method
- MD5 generated code word CWDh and the random value ZW are added up and the result is the MD5 hashing again.
- MD5 procedure applied This results in an MD5 hash value HW, which is again stored as a hexadecimal string and forms the middle part of the message NA transmitted from the communication unit KE to the access point ZPl in step 1, which in its final version consists of the user ID BK, the MD5 hash value HW and the random value ZW is composed.
- This message NA is sent from the communication unit E in step 1 to the access point ZPl of the communication network KN.
- the access point ZPl reads out the information transmitted in the message NA and interprets it.
- the first part of the message is identified as user identifier BK.
- the last part of the message is interpreted as a random value ZW.
- the transmitted user ID BK and the transmitted random value ZW are used by the access point ZPl in order to use the code word CWD of the communication unit KE, which is also stored in the communication network KN for the access points ZPx, for example in a central data memory DS, using the MD5 hashing method MD5 to compute an MD5 hash value.
- the code word CWD is fetched from the central data memory DS by the access point ZPl in a step 2.
- the MD5 hash value determined by the access point ZPl is compared with the MD5 hash value HW sent by the communication unit KE. If the value calculated by the access point ZPl matches the MD5 hash value HW sent by the communication unit KF and the random value ZW that is also sent is within a defined tolerance limit, the communication unit KE is authorized to obtain the service DN1. In a step 3, the service DN1 is triggered by the access point 7P1, so that in a step 4 a corresponding response message A is sent to the communication unit KE.
- step 4 a response message A is sent to the communication unit KE that use with this communication unit KE is not permitted since the communication unit KE is classified as untrustworthy.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004024648A DE102004024648A1 (en) | 2004-05-18 | 2004-05-18 | Method for authenticating a communication unit |
PCT/EP2005/051261 WO2005114945A1 (en) | 2004-05-18 | 2005-03-18 | Method for authenticating a communications unit while using a lasting programmed secret code word |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1754358A1 true EP1754358A1 (en) | 2007-02-21 |
Family
ID=34961966
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05717100A Withdrawn EP1754358A1 (en) | 2004-05-18 | 2005-03-18 | Method for authenticating a communications unit while using a lasting programmed secret code word |
Country Status (5)
Country | Link |
---|---|
US (1) | US20070234407A1 (en) |
EP (1) | EP1754358A1 (en) |
CN (1) | CN1954581A (en) |
DE (1) | DE102004024648A1 (en) |
WO (1) | WO2005114945A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7853150B2 (en) | 2007-01-05 | 2010-12-14 | Emcore Corporation | Identification and authorization of optoelectronic modules by host system |
EP1936906A1 (en) | 2006-12-22 | 2008-06-25 | Koninklijke KPN N.V. | Method to allow a network subscriber to gain access to a communication network |
JP4535163B2 (en) * | 2008-04-08 | 2010-09-01 | ソニー株式会社 | Information processing system, communication terminal, information processing apparatus, and program |
CN101729578B (en) * | 2008-10-27 | 2013-01-23 | 华为技术有限公司 | Application service access authentication method and application service access authentication agent |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3053527B2 (en) * | 1993-07-30 | 2000-06-19 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method and apparatus for validating a password, method and apparatus for generating and preliminary validating a password, method and apparatus for controlling access to resources using an authentication code |
US6606491B1 (en) * | 1998-06-26 | 2003-08-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Subscriber validation method in cellular communication system |
GB2344977A (en) * | 1998-12-17 | 2000-06-21 | 3Com Technologies Ltd | Password generation by hashing site and time data |
US6826690B1 (en) * | 1999-11-08 | 2004-11-30 | International Business Machines Corporation | Using device certificates for automated authentication of communicating devices |
FI112418B (en) * | 2000-02-01 | 2003-11-28 | Nokia Corp | Method for checking data integrity, system and mobile |
DE10026326B4 (en) * | 2000-05-26 | 2016-02-04 | Ipcom Gmbh & Co. Kg | A method of cryptographically verifying a physical entity in an open wireless telecommunications network |
US20030037237A1 (en) * | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US20020168962A1 (en) * | 2001-05-09 | 2002-11-14 | Docomo Communications Laboratories Usa | Customized service providing scheme |
-
2004
- 2004-05-18 DE DE102004024648A patent/DE102004024648A1/en not_active Withdrawn
-
2005
- 2005-03-18 EP EP05717100A patent/EP1754358A1/en not_active Withdrawn
- 2005-03-18 WO PCT/EP2005/051261 patent/WO2005114945A1/en not_active Application Discontinuation
- 2005-03-18 CN CNA2005800158546A patent/CN1954581A/en active Pending
- 2005-03-18 US US11/596,730 patent/US20070234407A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2005114945A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2005114945A1 (en) | 2005-12-01 |
DE102004024648A1 (en) | 2005-12-22 |
US20070234407A1 (en) | 2007-10-04 |
CN1954581A (en) | 2007-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69729356T2 (en) | METHOD AND DEVICE FOR SECURING THE ACCESS OF A STATION TO AT LEAST ONE SERVER | |
DE102015220228B4 (en) | Method and system for securing a first contact of a mobile device with a device | |
WO2003049365A1 (en) | Use of a public key key pair in the terminal for authentication and authorisation of the telecommunication user with the network operator and business partners | |
WO2010145979A1 (en) | Method for registering a mobile radio in a mobile radio network | |
DE102010055375B4 (en) | Automated login procedure on a vehicle website through a mobile communication terminal | |
DE10026326B4 (en) | A method of cryptographically verifying a physical entity in an open wireless telecommunications network | |
EP1964042B1 (en) | Method for the preparation of a chip card for electronic signature services | |
EP1754358A1 (en) | Method for authenticating a communications unit while using a lasting programmed secret code word | |
DE102011115154B3 (en) | Method for initializing and / or activating at least one user account | |
DE102009009310A1 (en) | Method for performing communication between e.g. head unit of automobile and server, for use in e.g. navigation field, involves storing specific certificate as identifier on remote device such that head units are identified | |
EP3271855B1 (en) | Method for generating a certificate for a security token | |
DE102008063864A1 (en) | A method for authenticating a person to an electronic data processing system by means of an electronic key | |
WO2000014895A2 (en) | Method for improving the security of authentication procedures in digital mobile radio telephone systems | |
DE102005011166A1 (en) | Computer system and method for signing, signature verification and / or archiving | |
EP3376419A1 (en) | System and method for electronically signing a document | |
DE102013202426A1 (en) | Method for enabling data communication between communication device of motor vehicle on one hand and Internet server on other hand, involves establishing network connection to Internet server by computing device separated from motor vehicle | |
WO2013075799A1 (en) | Method for authenticating a person at a server instance | |
EP2561460A1 (en) | Method for configuring an application for a terminal | |
EP2482573A2 (en) | Method for configuring a communication device and communication device | |
DE10204436B4 (en) | Continuous speaker verification using voice input | |
EP1414260A1 (en) | Method, system and devices for subscriber authentication in a telecommunication network | |
DE102010028217A1 (en) | Electronic device, telecommunication system and method for reading data from an electronic device | |
EP2723111B1 (en) | Multiple factor authentification for mobile end devices | |
DE10215747B4 (en) | Method, computer program with program code means and computer program product for the protected downloading of an electronic object into a Personal Area Network (PAN) and Personal Area Network (PAN) | |
WO2021175371A1 (en) | Secured and documented key access by an application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060821 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): DE FR GB |
|
17Q | First examination report despatched |
Effective date: 20070402 |
|
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS S.P.A. |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20080214 |