TWI313124B - Global positioning system(gps)based secure access - Google Patents

Global positioning system(gps)based secure access Download PDF

Info

Publication number
TWI313124B
TWI313124B TW94108799A TW94108799A TWI313124B TW I313124 B TWI313124 B TW I313124B TW 94108799 A TW94108799 A TW 94108799A TW 94108799 A TW94108799 A TW 94108799A TW I313124 B TWI313124 B TW I313124B
Authority
TW
Taiwan
Prior art keywords
mobile terminal
location
access
network
terminal
Prior art date
Application number
TW94108799A
Other languages
Chinese (zh)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Priority to TW94108799A priority Critical patent/TWI313124B/en
Application granted granted Critical
Publication of TWI313124B publication Critical patent/TWI313124B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

1313124 九、發明說明: 午月《修正替換頁i 【發明所屬之技#Η頁域】 本發明涉絲於全較㈣安全糊的㈣和方法。 【先前技術】 參 +密碼是-種慣用的安全機制,其可以阻止非授權用戶訪問 笔腦糸統’而同時在整個訪問過程中識職權用戶。然而, 授權用戶可有多種機制獲取授權用戶的密碼。 、而非 一旦一個非授權用戶獲得-個授權的用户密碼,兮非授權 用戶就可以用與授權用戶相同的方式訪問該電腦系統:很多又時 候,非授推用戶都是懷有惡意地訪問該電腦系統。非授權用戶 的活動-般會在重大的破壞出現或有引起中斷時才會被發覺。 要求授權用戶定期更改他們的密瑪,至少是在—定程产上 可以減少非授權用戶的活動。然而,該定期的時間周期通^是 幾周或幾则。姊__州編疋 即使授«戶叙更概㈣,也不料效 在這段時_實麵大麵和㈣。 她戶 =’杉電腦_每個_戶提供_變化隨機 ^生==,電腦系統管理者爲每一個授權用戶提供一個設 =内 僞隨機號碼發生器,其可在相應短的時間間 /一2如轉’產生—個代竭。該電腦系統同時被設置成可 疋的日守間内測疋該僞隨機號碼。當授權用戶嘗試訪問該 13131241313124 IX. Description of invention: Midday "Revision replacement page i [Technology of invention] Page 本 Field] The present invention relates to (4) and methods of safety (4) security paste. [Prior Art] A crypto+password is a customary security mechanism that prevents unauthorized users from accessing the pen and brain system while at the same time accessing the user during the entire access process. However, authorized users can have multiple mechanisms to obtain the password of an authorized user. Instead of an unauthorized user obtaining an authorized user password, an unauthorized user can access the computer system in the same way as an authorized user: in many cases, non-inviting users access the maliciously. computer system. The activities of unauthorized users will generally be detected when major disruptions occur or cause disruptions. Authorized users are required to change their Mima regularly, at least on a scheduled basis to reduce the activities of unauthorized users. However, the periodic time period is a few weeks or a few.姊__州编疋 Even if the author is more general (4), it is not expected to be effective at this time _ real face and (four). Her household = 'Song computer _ each _ household provides _ change random ^ life ==, the computer system administrator provides each authorized user with a set = internal pseudo-random number generator, which can be in a corresponding short time / one 2 If you turn 'generate' - exhaustion. The computer system is simultaneously set to detect the pseudo-random number within the defamatory day-to-day. When an authorized user attempts to access the 1313124

電腦系統, 爲密碼。 授權用戶就可轉賴設柄生成和_示的代碼作 前述提供的快速更改密碼的方法對短期來講是可行的,因 此’即使-個非授權用戶獲取了一個密碼,該密碼只在报短的 4期内才有效’其可有效地減少非授獅戶的破壞。 、 然而,這樣的電腦網路仍可能被暴露給非授權用戶。作爲Computer system, for password. It is feasible for an authorized user to rely on the code generated by the handle and the code shown in the above for the quick change of the password. Therefore, even if an unauthorized user obtains a password, the password is only short. It is only valid for the 4th period', which can effectively reduce the damage of non-Christian households. However, such a computer network may still be exposed to unauthorized users. As

-個附加的安全防範措施,—些電腦系統同時要求被授權用: 從二特定客戶終端訪問。該特定客戶終端被認爲是安全終端, 且最好安放在-個物理上可靠的位置。因此,爲了獲得對這種 電腦網路的雜權訪問’非授_戶必_時在該可靠的位置 内物理上地破壞其物理安全措施。 非授權用戶可通過獲取對該安全終端的遠端訪問,來繞過 該可靠位置_物理安全措施。因此,該安全終端的遠端訪問 通常是關_。然而,關_安全終蘭遠端關通常會切斷 …'、卜界的所有聯繫,甚至是安全終端朗於電綱路的飼服 器之間的。這在本質上弱化了該安全終端作爲—用作訪問 電腦系統的專用終端的功能。 通過對比即將結合附圖描述的本發明的系統,本技術領域 的人員將瞭解常規和傳統方法的其他局限及缺點。 【發明内容】 本發明提供了基於全球定㈣_安全訪_系統及方 1313124 在i實施例中,提供了—種用於授權訪 法。該方法包括.接## 4電鵰網路的方 移動終端是否處在财了叫^求;測定 置内,則㈣卿物處在預定位 預定位置外,卿㈣如+ 果所迷移動終端處在 卜難絕對所述電腦網路的訪問。 在另一實施例中,提供了—種製。。 可讀媒介。該電腦可讀 σσ〜气括—個電腦 在於㈤ 媒;,中存儲有多條可執行指令,复特η 在於,所述可執行指令用於:接收 /、特徵 請求,·-姉祕狀路初訪問的 所述移動終端處翔粒置 如果 n. , a π仙㈣所錢腦網路的訪 。’如果所述移祕端處在預粒 路的訪問。 摄撕所逑電腦網 實施财,提供了—_於授權訪問—個電腦網路 勺4網路。該通信網路包括—個伺服器和—個無線網路。兮 伺服器接㈣所述電_路進行訪_請求;該無線網路财 Γ全球定㈣統(GPS)技㈣通_介_定移動終端所 处位置,贴基於所述移動終端驗置_對所述電 路的訪問。 、 根據本發明的-個方面,提供了一種用於授權訪問一個電 腦網路的方法,此方法包括: 接收對所述電腦網路進行訪問的請求; 1313124 測定移動終端是否處在職位置内; 如果所述移動終端處在預定位置内,則授權對所述電腦網 路的訪問; 如果所述移動終端處在預定位置外,則拒絕對所述電腦網 路的訪問。 本發明之—特點是,此方法還包括:- An additional security precaution - some computer systems are required to be authorized at the same time: access from two specific client terminals. This particular client terminal is considered a secure terminal and is preferably placed in a physically reliable location. Therefore, in order to obtain miscellaneous access to such a computer network, the physical security measures are physically destroyed in the reliable location. Unauthorized users can bypass this reliable location by obtaining remote access to the secure terminal. Therefore, the remote access of the secure terminal is usually off. However, the _ security terminal remote end usually cuts off all connections between ...', Bu, and even the safety terminal between the feeders of the electric road. This essentially weakens the security terminal's function as a dedicated terminal for accessing a computer system. Those skilled in the art will appreciate other limitations and disadvantages of conventional and conventional methods by comparing the systems of the present invention as will be described in conjunction with the drawings. SUMMARY OF THE INVENTION The present invention provides a globally based (four)_secure access system and a party 1313124. In the i embodiment, a type of authorization access is provided. The method includes: whether the mobile terminal of the ## 4 electric engraving network is in the financial position; if the measurement is set, then (4) the Qing object is at a predetermined position outside the predetermined position, and the Qing (4) is a mobile terminal. Absolutely access to the computer network. In another embodiment, a seed system is provided. . Readable medium. The computer readable σσ 气 — 个 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑The mobile terminal at the first visit is located at the visit of the brain network if n., a π 仙(四). 'If the secret end is in the pre-grain access. Take the tears of the computer network to implement the financial, provided - _ authorized access - a computer network spoon 4 network. The communication network includes a server and a wireless network.兮 The server is connected to (4) the electric _ road to visit _ request; the wireless network is limited to the global (four) system (GPS) technology (four) _ _ _ the location of the mobile terminal, posted based on the mobile terminal verification _ Access to the circuit. According to an aspect of the present invention, a method for authorizing access to a computer network is provided, the method comprising: receiving a request to access the computer network; 1313124 determining whether the mobile terminal is in a working position; The mobile terminal is in a predetermined location to authorize access to the computer network; if the mobile terminal is outside the predetermined location, access to the computer network is denied. The invention is characterized in that the method further comprises:

請求無線it信網路來4定所述鶴終端的位置。 本七月之-特點是,所述請求該無線通信網路來確定所述 =動二端的位置的步财,進—步包括請求該無_信網路用 全球定位系統來確定所述移動終端的位置。 本^月之-特點是,該方法進—步包括接收—個密石馬。 隨馳是,該㈣包括—個顯示在軸終端上的 M守間k化隨鼓生的字母-數值型號碼。 本么月之4寺,點是,所述測定移動終端位置的步驟進—步 包括· 乂 ;所接收s彳的密碼來測定移動終端的位置。 才據本發明的另—個方面’提供了—種包含有電腦 介的製品’其特徵在於,所述電腦可讀齡巾 =執 行指令,所述可執行指令用於: 有夕個可執 至乂心地觀軸終端是否處在—個預定位置内; 如果所述移動终端處在預定位置内,則授權對所述電腦網 8 1313124 路的訪問; 如果所述移動終端處在預定位置外,則拒絕對所述電腦網 路的訪問。 本發明之一特點是,所述多條可執行指令進一步包括—條 可執行指令以用於: 接收對所述電腦網路進行訪問的請求。 本發明之一特點是’所述多條可執行指令進一纟包括—條 可執行指令以用於: 爲對所述網路的訪問啓動通信。 本發明之-特點是’所述多條可執行指令進—步包括至少 一條可執行指令以用於: 請求-個無線通信網路來確定所述移動終端的位置。 本發明之-特點是’所述請求無線通信網路來較所述移 =終端的位置的步驟巾’進―步包括請求該紐通信網路利用 〜全球定位彡絲確定所述飾終端的位置。 本發明之―特點是’所述多條可執行指令進—步包括至少 條可執行指令以用於: 接收一個密碼。 包括:之特點是,所述測定移動終端位置的步驟進-步 基於所接收到的密碼來測定移鱗端的位置。 1313124 本毛月之-特點是,所述密碼包括一個顯示 的隨時_化隨機産生的字母·數值型號碼。 、社 本發明之-特點是,所述隨時間變化隨機産生的字母-數 值型號碼是由移動終端産生的。 根據本發明的另—個方面,提供了—種用於授權訪問電腦 網路的It㈣統’所述通信網路包括··A wireless IT network is requested to determine the location of the crane terminal. This July is characterized in that the requesting the wireless communication network to determine the location of the location of the mobile terminal comprises: requesting the non-trust network to determine the mobile terminal by using a global positioning system s position. The feature of this ^ month is that the method further includes receiving a dense stone horse. In addition, the (4) includes a letter-value type number that is displayed on the terminal of the M-think. In the 4th Temple of the month, the point is that the step of determining the location of the mobile terminal further includes: 乂; the password of the received s彳 to determine the location of the mobile terminal. According to another aspect of the invention, there is provided a computer-containing article, characterized in that the computer-readable age towel=execution instruction is used for: Deliberately viewing whether the axis terminal is within a predetermined location; if the mobile terminal is within the predetermined location, authorizing access to the computer network 8 1313124; if the mobile terminal is outside the predetermined location, then Denying access to the computer network. One feature of the invention is that the plurality of executable instructions further comprise - executable instructions for: receiving a request to access the computer network. One feature of the present invention is that the plurality of executable instructions further include - executable instructions for: initiating communication for access to the network. The invention is characterized in that said plurality of executable instructions further comprise at least one executable instruction for: requesting a wireless communication network to determine the location of said mobile terminal. The feature of the present invention is that the step of requesting the wireless communication network to be closer to the location of the mobile terminal includes requesting the neon communication network to determine the location of the decorated terminal by using the global positioning cable. . The feature of the present invention is that the plurality of executable instructions further comprise at least one executable instruction for: receiving a password. Including: the step of determining the location of the mobile terminal further determines the location of the scaled end based on the received password. 1313124 This month's feature is that the password includes a displayed alphanumeric number that is randomly generated at any time. The invention is characterized in that the alpha-numerical number randomly generated over time is generated by the mobile terminal. According to another aspect of the present invention, there is provided an It network for authorizing access to a computer network.

個飼服ϋ ’驗接㈣所述電腦網賴行訪問的請求; 们'.、、線”、轉’驗至少部分啦赫終端所處的位置; 其中,所述伺服器授權對所述電腦網路的訪問依賴於所述 移動終端的位置。 訪問 本發明之—特點是,如果所述移祕端處於—特定位置 内’&則所述伺服賴權對所述電腦網路的訪問;如果所述移動 終端處於該狀位置外,麟述値雜簡所魏腦網路的 本發明之-_是’該無_路包括—全球定位系統,其 用於測定所述移動終端的位置。 精度是由該伺服 本發明之一特點是,所述移動終端位置的 器設定的。 本發明之一特點是,該系統進一步包括·· 用於提供該請求給伺服器的客戶終端。 本發明之-特點是,所述密碼是-個由移動終端顯示或産 a 川 124 生的隨時間變化隨機生成的字母·數值型號碼。 所接收到的密碼測 —本發明之一特點是,所述無線網路基於 定移動終端的位置。 x月的上述及其&優點及其新簡點,及本發明優選實 施例的細^縣合下述描軌關蚊f於全面理解。 【實施方式】a feeding service ϋ 'receive (4) the request of the computer network Lai Xing access; we '., line, turn 'test' at least part of the location of the Lach terminal; wherein the server authorizes the computer The access of the network depends on the location of the mobile terminal. Access to the present invention is characterized in that if the secret terminal is in a -specific location, the access to the computer network is accessed by the server; If the mobile terminal is in the position of the mobile terminal, the invention of the present invention is to use the global positioning system for determining the location of the mobile terminal. Accuracy is set by the servo. One of the features of the present invention is that the location of the mobile terminal is set. One of the features of the present invention is that the system further includes a client terminal for providing the request to the server. - The characteristic is that the password is a letter/numerical number randomly generated by the mobile terminal or generated by the time change. The received password measurement - one feature of the present invention is that the wireless Network based And the position of the mobile terminal & amp x month;. Advantages and new profile points, and the preferred embodiment of the present invention is described below County of fine ^ off track in a comprehensive understanding of mosquito f [Embodiment.

現請參考圖1,其中示出了根據本發明-個實施例的用於 移動〜如以提供-隨時間變化隨機密碼的典型通信系 統的方框圖。該系統包括_電腦網路则和一無線網路⑽。 该電腦網路100包括一伺服器105,其可被處於物理位置 117中的客戶終端115透過電腦網路励所訪問。該電腦網路 100可以是任何-種f子或絲=#訊分佈網路,並可包括任何 多種通信媒介的組合,包括但不限於:因特網、公共交換電話 網、局域網(LAN)及廣域網(WAN)。 該伺服器105可提供對存儲有敏感的或類似資訊的資料 庫的訪問’或者允許個體執行各種事務。因此’控制對伺服器 105的訪問非常重要。故’伺服器1〇5需要來自客戶終端的U5 的密碼以驗證客戶終端115的使用者的身份。 作爲安全措施的附加層,電腦網路100要求授權用戶從 物理位置117訪問該電腦網路1〇〇。該特定的物理位置in是 一預定的物理安全位置,一般的公衆是不易進入的。當非授權 1313124 用戶企圖訪問電腦網路1〇〇,則電腦網路loo會要求該用戶提 七、在碼。另外,電腦網路1〇〇採用無線網路13〇,經由終端 125來查找與用戶結合的移動終端12〇所在的位置。終端125 疋可直接或經由其他網路對無線網路130進行訪問的終 端例如,該終端125可以包括一連接在無線網路13〇或公共 交換電話網絡上的電腦。 如果用戶提供正確的密碼,並且無線終端12Q處於物理 位置117内,則電腦網路1〇〇接受用戶的訪問。 值得/主思的是,非授權用戶不僅需要一個授權用戶的密 碼’艰需要有能力在物理位置117内放置授權用戶的移動終端 120而且,即使一非授權用戶成功地遠端訪問該客戶終端 ⑴’電腦網路100也不會允許非授權用戶訪問。因此,客戶 、端115處热需關閉遠端訪問。這就允許客戶終端115用作其 他用途,例如訪問因特網。 在一個實_巾,作爲-侧加的安全特徵,電腦網路 β、採用隨4間變化隨機產生的密碼。這種隨時間變化隨 機產生的密碼可以在移動終端12()上顯示。上述的系統和 方法在集成安全識別卡到蜂窩電話中(Imegrati〇n 〇f 相if咖oncardsim〇ceUph〇ne),,專利中已有描述^ ^ 專利申凊號爲:--~,代理機構代號·· 15469US01,Relan 等於2004年3月16时請,此處以之作爲參考。在訪問過程 12 1313124Referring now to Figure 1, there is shown a block diagram of a typical communication system for moving - to provide a random password over time, in accordance with an embodiment of the present invention. The system includes a computer network and a wireless network (10). The computer network 100 includes a server 105 that can be accessed by a client terminal 115 in physical location 117 via a computer network. The computer network 100 can be any type of f- or wire-distribution network and can include any combination of communication media including, but not limited to, the Internet, a public switched telephone network, a local area network (LAN), and a wide area network ( WAN). The server 105 can provide access to a database storing sensitive or similar information' or allow individuals to perform various transactions. Therefore, it is very important to control access to the server 105. Therefore, the server 1〇5 needs the password of U5 from the client terminal to verify the identity of the user of the client terminal 115. As an additional layer of security measures, computer network 100 requires an authorized user to access the computer network 1 from physical location 117. The particular physical location in is a predetermined physical security location that is generally not readily accessible to the general public. When an unauthorized 1313124 user attempts to access the computer network, the computer network loo will ask the user to pick up the code. In addition, the computer network 1 uses the wireless network 13 to find the location of the mobile terminal 12 与 associated with the user via the terminal 125. Terminal 125 A terminal that can access wireless network 130, either directly or via other networks. For example, terminal 125 can include a computer coupled to a wireless network 13 or a public switched telephone network. If the user provides the correct password and the wireless terminal 12Q is in the physical location 117, the computer network 1 accepts access by the user. It is worthwhile to think that the unauthorized user not only needs the password of an authorized user, but it is difficult to place the authorized user's mobile terminal 120 in the physical location 117 and even if an unauthorized user successfully accesses the client terminal remotely (1) 'Computer network 100 will also not allow unauthorized users to access. Therefore, the client and terminal 115 need to turn off remote access. This allows the client terminal 115 to serve other purposes, such as accessing the Internet. In a real towel, as a side-added security feature, the computer network β, using a password randomly generated with 4 changes. This randomly generated password over time can be displayed on the mobile terminal 12(). The above system and method integrates a security identification card into a cellular phone (Imegrati〇n 〇fphase ifca oncardim〇ceUph〇ne), which has been described in the patent ^ ^ Patent application number: ---, agency Code · 15469US01, Relan is equal to March 16, 2004, please use it here for reference. During the visit process 12 1313124

产生密二用::提供顯不在移動終端12。上的隨時間變化隨機 産生㈣。_附加特徵在實際上可以確保正在訪_ 於物理位置117内。移動終端叫可集成到客戶終端115中 以便於使用。 如參考圖2 ’其中示出了本發明—實施财伺服器105 插作的流程圖。在步驟155中,伺服_接收—個對電腦網 路100進行訪問的請求。在步驟16G巾,伺服器⑽要求來自 用戶的密碼。如上述’許多方案可以用來收集這些密碼。在一 個實施例中,該密碼可以是―種隨時間變化隨機産生的字母_ 數值型號碼。 在步驟165 伺服器105確定所提供的密碼是否爲正確 的密碼。如果在步驟165中,步驟160中所提供的密碼是不正 確的話,則伺服器105會預定次數要求用戶再二欠提供密碼,如 果在預定次數後(步驟Π5),用戶仍不能提供正確的密碼, 則伺服器105拒絕該次訪問(步驟ι8〇)。 當用戶在步驟165中提供了正確的密碼,伺服器1〇5然後 會經由終:¾¾ 125要求無線網路檢查移動終端12〇所處的位置 (步驟18 5 ),以測定所述移動終端丨2 〇是否處在位置丨丨7中(步 驟190)。如果所述移動終端120處在位置U7中,則伺服器 105允許授權用戶的訪問(步驟195)。如果所述移動終端120 沒有處在位置117中’則伺服器105拒絕該訪問(步驟18〇)。 13 1313124 伺服器105採用無線網路130來檢查無線終端120所處的 位置。該無線網路130可以包括多種通信網路,包括但不限 於:全球移動通信系統(GSM),或個人通信業務網(PCS), 正EE 802.11無線局域網,乙太網等。 現請參考圖3,其示出了 一全球移動通信系統(GSM ) 的公共陸地移動網(PLMN) 210的方框圖。該PLMN 210由 大量的區域212組成,每個區域内均具有一個被稱爲移動交換 釀中心(MSC)214的節點,及一用戶位置寄存器(VLR)216。 該MSC/VLR區域212,依次包括大量的位置區(LA) 218, 其被定義爲給定的MSC/VLR區域212的一部分,移動終端120 可以在位置區218内自由移動,而不需發送更新位置資訊給管 控LA 218的MSC/VLR區域212。每個位置區212被切分成很 多小區222。移動終端22〇爲物理設備,例如爲車載電話或其 他軍上型電話,其被移動用戶用於與蜂窩網路210、相互之間、 • 用戶網路外的有線或無線使用者進行通信。 移動父換中心214與至少一基站控制器(BSC) 223進行 通信,該基站控制器(BSC) 223依次與至少一基站(bts) 224連接。基站是一種包括有物理設備的節點,可以簡單描述 爲^種無線電天線塔,其可對小區從的地理區域提供可靠的 無、、泉覆盖。可以㈣理解,基站控制器223可被多個基站224 亚可被做成單機節點’或者與移動交換中心集成。無論 可在只施例中,該基站控制器223和基站224總體上來 1313124 - 說通常歸納爲-基站系統(BSS) 225。至少-個移動交換中 心214連接在公共交換電話網(psTN)上。 PLMN的業務區或無線網21〇包括一歸屬位置寄存器 (HLR) 226 ’其是一個用於管理所有用戶資訊的資料庫。該 用戶貢訊包括諸如’用戶文槽,當前位置資訊,國際移動用戶 識別號(IMSI) ’及其他的管理資訊。歸屬位置寄存器挪可 以與-給定的移動交換中心214協同定位,或與其集成,或擇 籲-地服務於多重移動交換中心214。後面將對其進行說明。 访客寄存器216是-個包含有關於當前處於Msc脱尺區 域212中的所有移動終端的資訊的資料庫。如果一個移動 終端120漫遊進一個新的MSC/VLR區域212,連接在移動交 換中心上的訪客寄存器別會向歸屬位置寄存器資料庫請 求所述移動終端12〇相關的資料(同時向歸屬位置寄存器挪 通纟所述移動終端的當前位置)。因此,當移動終端120以後 打電4 ’本地訪客位置寄存器2丨6無需重新審問歸屬位置 寄存器216就可擁有必需❹份識別資訊。麵描述的方法 中,訪客位置寄存器資料庫216和歸屬位置寄存器226,分別 包含有各種與給定移祕端120結合的用戶的資訊。 全球移動通信系統公共陸地移動網210也具有查找移動 終端120的能力,其所採用的是全球定位系統(GPS)。全球 定位系統利用與所難動終端12〇㈣的基站224來測定所述Generating the dual use:: Providing the mobile terminal 12 is not visible. The change over time is randomly generated (4). The _ additional feature can actually ensure that it is being accessed within physical location 117. The mobile terminal can be integrated into the client terminal 115 for ease of use. As shown in Fig. 2', a flow chart of the implementation of the present invention-implementation server 105 is shown. In step 155, the servo_receives a request to access the computer network 100. At step 16G, the server (10) asks for a password from the user. As mentioned above, many programs can be used to collect these passwords. In one embodiment, the password may be a letter_numeric type number that is randomly generated over time. At step 165, the server 105 determines if the provided password is the correct one. If the password provided in step 160 is incorrect in step 165, the server 105 requests the user to refrain from providing the password a predetermined number of times. If after a predetermined number of times (step Π5), the user still cannot provide the correct password. , the server 105 rejects the access (step ι8〇). When the user provides the correct password in step 165, the server 1〇5 then requests the wireless network to check the location of the mobile terminal 12〇 via the terminal (step 185) to determine the mobile terminal. 2 〇 is in position 丨丨7 (step 190). If the mobile terminal 120 is in location U7, the server 105 allows access by an authorized user (step 195). If the mobile terminal 120 is not in position 117' then the server 105 rejects the access (step 18A). 13 1313124 The server 105 employs the wireless network 130 to check the location of the wireless terminal 120. The wireless network 130 can include a variety of communication networks including, but not limited to, Global System for Mobile Communications (GSM), or Personal Communications Service Network (PCS), EE 802.11 wireless local area network, Ethernet, and the like. Referring now to Figure 3, a block diagram of a Public Land Mobile Network (PLMN) 210 of the Global System for Mobile Communications (GSM) is shown. The PLMN 210 is comprised of a plurality of areas 212 each having a node called a Mobile Switching Center (MSC) 214 and a User Location Register (VLR) 216. The MSC/VLR area 212, in turn, includes a plurality of location areas (LAs) 218, which are defined as part of a given MSC/VLR area 212, and the mobile terminal 120 can move freely within the location area 218 without sending updates. The location information is directed to the MSC/VLR area 212 of the LA 218. Each location area 212 is divided into a number of cells 222. The mobile terminal 22 is a physical device, such as a car phone or other military-type phone, which is used by mobile users to communicate with cellular networks 210, with each other, or by wired or wireless users outside the user's network. The mobile parent switching center 214 is in communication with at least one base station controller (BSC) 223, which in turn is coupled to at least one base station (bts) 224. A base station is a node that includes physical devices and can be simply described as a radio antenna tower that provides reliable coverage of the geographic area from which the cell is located. It can be understood (4) that the base station controller 223 can be made into a single-node node by a plurality of base stations 224 or integrated with a mobile switching center. Regardless of the application, the base station controller 223 and the base station 224 are generally 1313124 - generally referred to as a - base station system (BSS) 225. At least one mobile switching center 214 is connected to the public switched telephone network (psTN). The PLMN's service area or wireless network 21 includes a Home Location Register (HLR) 226' which is a repository for managing all user information. The user consent includes such information as 'user scam, current location information, International Mobile Subscriber Identity (IMSI)' and other management information. The home location register can be co-located with, or integrated with, a given mobile switching center 214, or serviced to multiple mobile switching centers 214. This will be explained later. The visitor register 216 is a database containing information about all mobile terminals currently in the Msc strip area 212. If a mobile terminal 120 roams into a new MSC/VLR area 212, the guest register connected to the mobile switching center requests the mobile terminal 12 to the home location register database for related data (simultaneously to the home location register). Through the current location of the mobile terminal). Therefore, when the mobile terminal 120 powers up 4' local visitor location register 2丨6, it is necessary to re-interrogate the home location register 216 to have the necessary fingerprint identification information. In the method described above, the visitor location register database 216 and the home location register 226 contain information about various users associated with a given portant 120, respectively. The Global System for Mobile Communications Public Land Mobile Network 210 also has the ability to find mobile terminals 120 using a Global Positioning System (GPS). The global positioning system utilizes the base station 224 with the difficult terminal 12(4) to determine the said

15 131312415 1313124

=動終端120的物理位置。每一基站224利用錄電信號來測 又所4移動終端120與每-基站224之間的距離。基站224發 移動終端12〇。爲回應所接收的來自基站224的信 就’所轉祕端120也發送鱗f信號,馳鷄終端所發 适的無線電錢標示有所述移祕端傳賴無線餘號的時 間。因此,從基站224傳送該無線電信號與接收無線電信號之 間的時延就可以測定所述移動終端12()與基站224之間的距 離。GPS節點236測定並三角測量與幾個基站224的距離以測 定所述移動終端120的物理位置。 在本發明的—個實施财,在用戶的f試關過程中, 電腦網路loo要求GSMPL顧加使用Gps蚊位移動終端 ⑶。作爲回應,GSMPLMN21()報告所述移動終端12〇的位 置給電腦網路_。電腦網路⑽然後確定所述移動終端12〇 是否處於物理區域117内。如果移動終端12〇處於該物理區域 117中’且用戶提供了正確的密碼,則電腦網路1〇〇允許訪問。 …見> 考圖4’其不出了根據本發明一個實施例的用於描述 通信網路操作的錢流_。用戶通過提供密碼(信號*⑹ 要求訪問電腦網路100。飼服器1〇5然後驗證該密石馬⑽)。 通過驗證該密碼,伺服器105然後發送一個與該授權用戶關聯 的位置的請求(信號415)給與該無線網路13〇關 耳外的GPS郎點236。 16 1313124 ’ 無_路13Q的下部結構傳遞輯求給與移動終端120 -關聯的MSC2H。該MSC214命令(信號42〇)多個基站似 比収所述基站224與移動終端m之間的距離。基站224發 f無線電信號(信號425)給移動終端120並接收來自移動終 端120的無線電信號(信號43〇)。 被移動終端120傳送的無線電信號中標示有移動終端12〇 傳达該信號的時間。因此,從基站224傳送該無線電信號與接 • 收無線電信號之間的時延就可以測定所述移動終端no與基 站224之間的距離。 基站224提供了從移動終端120到GPS節點236 (信號 435)的彳§號的接收時間。gps節點236測定並三角測量(信 號440)與幾個基站224的距離以測定所述移動終端12〇的物 理位置。GPS節點236然後經由終端125將移動終端的物理位 置(信號445)提供給伺服器1〇5。 ❿ 伺服器105然後測定(450)所述移動終端12〇是否處於 物理區域117中並拒絕或允許其中的訪問。 現请參考圖5 ’其中示出了根據本發明的一實施例一個典 型伺服器105的方框圖。CPU60經由系統匯流排62與隨機訪 問記憶體(RAM) 64、唯讀記憶體(ROM) 66、輸入/輸出(I/O ) 適配器68、用戶介面適配器72、通信適配器84及顯示適配器 86相連接。該I/O適配器將外設(如硬碟驅動器40、用於讀 1313124 取移動軟碟42的軟碟驅動器41、讀取諸如壓縮盤或數位 通用盤的可移動光碟44的光碟驅動器叫連接到靜排泣 上。用戶介面適配器72連接有—些設備,諸如鍵㈣、具多 按鈕67的滑鼠76、揚聲器78、麥克風82、和/或其他的用戶 周邊設備,如聰屏設備(未㈣)至匯_ 62。通信適配 器科將電腦系統連接至資料處理網路%。顯示適配器%連接 一顯示器88至總路線62。= physical location of the mobile terminal 120. Each base station 224 utilizes a recorded electrical signal to measure the distance between the four mobile terminals 120 and each of the base stations 224. The base station 224 transmits the mobile terminal 12A. In response to the received message from the base station 224, the secret terminal 120 also transmits a scale f signal, and the radio money issued by the Chiji terminal indicates the time at which the secret terminal passes the wireless residual number. Thus, the distance between the mobile terminal 12() and the base station 224 can be determined by transmitting a delay between the radio signal and the received radio signal from the base station 224. The GPS node 236 measures and triangulates the distance from several base stations 224 to determine the physical location of the mobile terminal 120. In the implementation of the present invention, during the user's test, the computer network loo requires the GSMPL to use the Gps mosquito mobile terminal (3). In response, GSMPLMN 21() reports the location of the mobile terminal 12 to the computer network _. The computer network (10) then determines if the mobile terminal 12 is within the physical area 117. If the mobile terminal 12 is in the physical area 117 and the user provides the correct password, the computer network 1 allows access. ... see > Figure 4' shows a money flow_ for describing the operation of a communication network in accordance with one embodiment of the present invention. The user requests access to the computer network 100 by providing a password (signal * (6). The feeder 1〇5 then verifies the Mi Ma (10)). By verifying the password, the server 105 then sends a request (signal 415) to the location associated with the authorized user to the GPS ray point 236 outside of the wireless network 13. 16 1313124 The lower structure of the no-channel 13Q is transmitted to the MSC 2H associated with the mobile terminal 120. The MSC 214 commands (signal 42 〇) a plurality of base stations to approximate the distance between the base station 224 and the mobile terminal m. The base station 224 sends a radio signal (signal 425) to the mobile terminal 120 and receives a radio signal (signal 43) from the mobile terminal 120. The radio signal transmitted by the mobile terminal 120 indicates the time at which the mobile terminal 12 communicates the signal. Therefore, the distance between the mobile terminal no and the base station 224 can be determined by transmitting the delay between the radio signal and the received radio signal from the base station 224. Base station 224 provides the time of receipt of the 彳§ number from mobile terminal 120 to GPS node 236 (signal 435). The gps node 236 measures and triangulates (signal 440) the distance from several base stations 224 to determine the physical location of the mobile terminal 12A. The GPS node 236 then provides the physical location (signal 445) of the mobile terminal to the server 1〇5 via the terminal 125. The server 105 then determines (450) whether the mobile terminal 12 is in the physical area 117 and denies or allows access therein. Referring now to Figure 5', there is shown a block diagram of a typical server 105 in accordance with an embodiment of the present invention. The CPU 60 is connected to a random access memory (RAM) 64, a read only memory (ROM) 66, an input/output (I/O) adapter 68, a user interface adapter 72, a communication adapter 84, and a display adapter 86 via a system bus 62. . The I/O adapter connects a peripheral device such as a hard disk drive 40, a floppy disk drive 41 for reading 1313124 to the removable floppy disk 42, and a compact disk drive for reading a removable optical disk 44 such as a compact disk or a digital versatile disk. The user interface adapter 72 is connected to some devices, such as a key (four), a mouse 76 with a multi-button 67, a speaker 78, a microphone 82, and/or other user peripherals, such as a smart screen device (not (4) ) to sink _ 62. The Communication Adapter Section connects the computer system to the data processing network %. The display adapter % connects a display 88 to the general route 62.

本發明的—個實_可以作爲駐存在-個❹個如圖5 描述的通祕置的電齡統58中_訪問記憶财的文件來 實現。當被纟嶋、統58要求時,該文件可以被存制另一電 腦可讀記丨谢,例如存蹲鱗驅動器4()、或移動記憶體 (諸如可在光碟機43中使用的光碟体可在軟盤機Μ中使用 的軟碟42)中。教件可包括多個可被電腦系統執行的指令, 促使電腦纽完成各齡務,例如完賴2巾所描述的流程 圖。 ^值m'的疋’指令集的物理存儲在物理上改變了以電 子上磁it上或化學方式存儲它的媒介,以韻齡攜帶有電 腦可讀資訊。 u本發明已參考—定的實施例進行了描述,本領域的 曰通技術人貞可以理解的是,各種可能的改變及替代將不脫離 本毛明的範圍。另外’很多對本發明所述内容的適合特別情況 1313124 和材料的修改也不脫離本發明的範圍。因此,本發明+ < 揭示的實施例’本發明將包括所有落入後述權利要求範圍中2 實施例 【圖式簡單說明】 圖1是根據本發明一個實施例的用於對— 訪問的通信系統的方框圖。 電腦網路提供安全The actual _ of the present invention can be implemented as a file that resides in the memory system of the electronic system 58 as described in FIG. When requested by the system, the file can be stored and read by another computer, such as a memory drive 4 (), or a removable memory (such as a disk that can be used in the optical disk drive 43). It can be used in the floppy disk 42) used in the floppy disk. The teachings can include a number of instructions that can be executed by the computer system to cause the computer to complete the tasks of the age, such as the flow diagram described by the 2 towels. The physical storage of the 疋' instruction set of the value m' physically changes the medium that electronically stores it electronically or chemically, carrying computer-readable information at the age of the genius. The present invention has been described with reference to the preferred embodiments, and it is understood by those skilled in the art that various changes and substitutions may be made without departing from the scope of the present invention. Further, many modifications to the particulars of the present invention, 1313124 and materials, do not depart from the scope of the invention. Accordingly, the present invention is to be construed as being limited to the scope of the following claims. A block diagram of the system. Computer network provides security

圖2是根據本發明一個實施例的用於描述伺服器操作的流程 圖。2 is a flow diagram for describing the operation of a server, in accordance with one embodiment of the present invention.

圖3是根據本發明一個實施例的採用公共陸地移動網路的典 型的全球移動通信系統的方框圖; 圖4是根據本發明一個實施例的用於描述通信網路操作的信 號流程圖;以及 圖5疋用於描述實現本發明的一個實施例的典型硬體環境的 方框圖。 【主要元件符號說明】 電腦網路100 客戶終端115 移動終端12〇 無線網路130 接收對蘇細網路進行訪問的請求1 要求來自用戶的密碼16Θ 密碼正確165 伺服器105 物理位置117 終端1253 is a block diagram of a typical global mobile communication system employing a public land mobile network, in accordance with one embodiment of the present invention; FIG. 4 is a signal flow diagram for describing operation of a communication network, in accordance with one embodiment of the present invention; 5A block diagram for describing a typical hardware environment in which one embodiment of the present invention is implemented. [Description of main component symbols] Computer network 100 Client terminal 115 Mobile terminal 12〇 Wireless network 130 receives a request to access the fine network 1 Requires a password from the user 16Θ The password is correct 165 Server 105 Physical location 117 Terminal 125

19 1313124 移動終端處在位置内170 密碼已被檢驗了預定次數175 拒絕訪問180 要求蜂窩電話網絡檢查移動終端的位置185 授權訪問195 全球移動通信系統(GSM)的公共陸地移動網(pLMN) 21〇 區域212 移動交換中心(MSC) 21419 1313124 The mobile terminal is in location 170 The password has been verified a predetermined number of times 175 Denied access 180 Requires the cellular telephone network to check the location of the mobile terminal 185 Authorized access 195 Global System for Mobile Communications (GSM) Public Land Mobile Network (pLMN) 21〇 Area 212 Mobile Switching Center (MSC) 214

用戶位置寄存器(VLR) 216 位置區(LA) 218 移動終端220 小區222 基站控制器(BSC) 223 基站(BTS) 224 基站系統(BSS) 225 歸屬位置寄存器(HLR) 226 GPS節點236 信號 405、415、420、425、430、435、440、445 硬碟驅動器40 軟碟驅動器41 移動軟碟42 光碟驅動器43 可移動光碟44 通用配置的電腦系統58 CPU 60 系統匯流排62 隨機訪問記憶體(RAM) 64 唯讀記憶體(ROM) 66 按鈕67 輸入/輸出(I/O)適配器68 用戶介面適配器72 鍵盤74 滑鼠76 揚聲器78 20 1313124 麥克風82 通信適配器84 顯示適配器86 顯示器88 資料處理網路92User Location Register (VLR) 216 Location Area (LA) 218 Mobile Terminal 220 Cell 222 Base Station Controller (BSC) 223 Base Station (BTS) 224 Base Station System (BSS) 225 Home Location Register (HLR) 226 GPS Node 236 Signals 405, 415 420, 425, 430, 435, 440, 445 hard disk drive 40 floppy disk drive 41 mobile floppy disk 42 optical disk drive 43 removable optical disk 44 general configuration of computer system 58 CPU 60 system bus 62 random access memory (RAM) 64 Read Only Memory (ROM) 66 Button 67 Input/Output (I/O) Adapter 68 User Interface Adapter 72 Keyboard 74 Mouse 76 Speaker 78 20 1313124 Microphone 82 Communication Adapter 84 Display Adapter 86 Display 88 Data Processing Network 92

1313124 1 正替換頁丨 如果所述移動終端處在預^ 的訪間 置夕卜’則拒絕對所述電鵰網& 6.如申請專利範_項所 指令進-步包括-條可執行指令^ ’其中所述夕條可執行 行訪問的請求。 …接收對所述電腦網略進 7.如申請專利範圍第5項所述的製 指令進-步包括-射執奸入 ^,其情述多條可執行 動通信 丁^以用於:爲對所述網路的訪問啓 8 括: •一種用於授權訪問電腦網路的通信系統, 所述通信系統包 侧司服H,用於接_所述電腦鄉 丨路進行訪問的請求; -個無線’驗至少部分測定_終端嘴的位置; :賴於所述移 其令’所述飼服器授權對所述電腦網路的訪問依3 動終端的位置。 ’ 請專補_ δ顿賴触_,射喊所述移 動Ά處於特枝置内,則所述舰器授權對所述電腦網路的訪 問’如果所述移祕端處於婦定位置外,則所麵㈣拒㈣ 所述電腦網路的訪問。 10·如申請專利範圍第9項所述的通⑽、統,其中所述無線網 路包括用於測定所述移動終端的位置的全球定位系统。 231313124 1 is replacing the page 丨 if the mobile terminal is in the pre-existing visit, then the electronic engraving network is rejected. 6. The instruction is as follows: The instruction ^ 'where the eve can perform a row access request. ...receiving a slight advance to the computer network. 7. The system of the invention as described in claim 5 of the scope of the patent application includes - shooting the rape into the ^, and the description of the plurality of executable communication communications is used for: Access to the network includes: • a communication system for authorizing access to a computer network, the communication system package side service H, for receiving a request for access to the computer township road; Wireless wirelessly inspects at least a portion of the position of the terminal; depending on where the mobile device authorizes access to the computer network. 'Please supplement _ δ 顿 触 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Then (4) refused (4) access to the computer network. 10. The system of claim 9, wherein the wireless network comprises a global positioning system for determining a location of the mobile terminal. twenty three

Claims (1)

1313124 十、申請專利範圍: ’其特徵在於’所述方 1 _ 一種用於授權訪問電腦網路的方法 法包括: 接收對所述電腦網路進行訪問的請求; 測定移動終端是否處在預定位置内; 内’則授騎崎電腦網路 如果所述移動終端處在預定位置 的訪問; 的訪ζ果所祕祕端處在财位置外,難_所述電腦網路 2·如申請專利範圍第1項所述的方法,所述方法進-步包括. 清求無線通信網路來錢所獅祕端的位置。 3·如帽專利範項所述的方法,其中所述請求無 來確定所述移動终端細步驟進-步包括:請求所述 線通信網路细全球定樣絲確定所述雜终端的位置。 4.如申請專利範圍第2項所述的方法,其中所述方法進—步 接收一個密碼 ㈣5 —種包含有腦可讀媒介的製品,所述侧可讀媒介中存 有多個可執行指令,所述可執行指令用於·· 地測定移動終端是否處在-預定位置内; 的訪^果所述移動終端處在預定位置内,則授輯所述電腦網路 221313124 X. Patent application scope: 'It is characterized by 'the party 1 _ A method for authorizing access to a computer network includes: receiving a request for access to the computer network; determining whether the mobile terminal is at a predetermined location If the mobile terminal is in a predetermined location; if the secret end of the visiting mission is outside the financial position, it is difficult to use the computer network. The method of item 1, the method further comprising: clearing the location of the wireless communication network to the lion's secret end. 3. The method of claim 5, wherein the requesting to determine the step of stepping the mobile terminal comprises: requesting the line communication network to determine the location of the miscellaneous terminal. 4. The method of claim 2, wherein the method further receives a password (4) 5 - an article comprising a brain readable medium, the side readable medium having a plurality of executable instructions The executable instruction is used to determine whether the mobile terminal is in a predetermined location; if the mobile terminal is in a predetermined location, the computer network 22 is authorized
TW94108799A 2005-03-22 2005-03-22 Global positioning system(gps)based secure access TWI313124B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94108799A TWI313124B (en) 2005-03-22 2005-03-22 Global positioning system(gps)based secure access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94108799A TWI313124B (en) 2005-03-22 2005-03-22 Global positioning system(gps)based secure access

Publications (1)

Publication Number Publication Date
TWI313124B true TWI313124B (en) 2009-08-01

Family

ID=45072720

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94108799A TWI313124B (en) 2005-03-22 2005-03-22 Global positioning system(gps)based secure access

Country Status (1)

Country Link
TW (1) TWI313124B (en)

Similar Documents

Publication Publication Date Title
US7372839B2 (en) Global positioning system (GPS) based secure access
TWI333776B (en) Method, apparatus and article to remotely associate wireless communications devices with subscriber identities and /or proxy wireless communications devices
US10305881B2 (en) Controlled token distribution to protect against malicious data and resource access
US7224987B1 (en) System and method for controlling access to location information
US8898760B2 (en) Authenticating a transaction when a connection to a network becomes unavailable
CN104620250A (en) Systems and methods of using a temporary private key between two devices
US8700710B1 (en) Constructing social networks
US20060020816A1 (en) Method and system for managing authentication attempts
US8291085B2 (en) Value information transfer system and value information transfer method
US20110190009A1 (en) System and method for location privacy and location information management over wireless systems
US20220012743A1 (en) Authentication electronic infrastructure
US11823515B2 (en) Method, system and apparatus for equipment monitoring and access control
CN102067143A (en) System, method and apparatus for security management of an electronic device
KR20160055872A (en) Method and system for location based data communication over network
CN107483503A (en) A kind of application program login method, apparatus and system
KR100796737B1 (en) Certification System Using One Time Passport And Certification Method Using One Time Passport
US20080183714A1 (en) Location-based brokerage service for heterogeneous access roaming
KR101600455B1 (en) Method, system and recording medium for service account authentication
JP5991143B2 (en) Information processing apparatus, system, and information registration method
JP2005064737A (en) Wireless lan system and access point
TWI313124B (en) Global positioning system(gps)based secure access
JP5409871B2 (en) Personal information providing apparatus and personal information providing method
JP2010152492A (en) Device, system, and method for providing personal information
JP2006222619A (en) Contactless ic chip mounted radio communication terminal device, reader writer device for contactless ic chip, and communication system for contactless ic chip
CA2701736A1 (en) Content distribution with inherent user-oriented authorization verification

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees