TWI434588B - A gsm roaming authentication method - Google Patents

A gsm roaming authentication method Download PDF

Info

Publication number
TWI434588B
TWI434588B TW101100673A TW101100673A TWI434588B TW I434588 B TWI434588 B TW I434588B TW 101100673 A TW101100673 A TW 101100673A TW 101100673 A TW101100673 A TW 101100673A TW I434588 B TWI434588 B TW I434588B
Authority
TW
Taiwan
Prior art keywords
code
authentication
access terminal
key
user
Prior art date
Application number
TW101100673A
Other languages
Chinese (zh)
Other versions
TW201330665A (en
Inventor
Tzone Lih Hwang
Original Assignee
Univ Nat Cheng Kung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Cheng Kung filed Critical Univ Nat Cheng Kung
Priority to TW101100673A priority Critical patent/TWI434588B/en
Priority to US13/734,235 priority patent/US8855604B2/en
Publication of TW201330665A publication Critical patent/TW201330665A/en
Application granted granted Critical
Publication of TWI434588B publication Critical patent/TWI434588B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

GSM漫遊認證方法GSM roaming authentication method

本發明係關於一種GSM通訊認證方法,尤其是一種用於開放式通道之GSM漫遊認證方法。The invention relates to a GSM communication authentication method, in particular to a GSM roaming authentication method for an open channel.

由於全球行動通訊系統(Global System for Mobile Communication,GSM)採用數位調變、身分認證及訊息加密等機制,相較於採用類比調變的通訊系統,具有保密性高、系統服務容量增加、可傳輸數據資料等優點,因此,已廣泛地使用在歐洲及其他全球各地。Since the Global System for Mobile Communication (GSM) adopts mechanisms such as digital modulation, identity authentication and message encryption, it has high confidentiality, increased system service capacity, and can be transmitted compared to a communication system using analog modulation. Data and other advantages, therefore, have been widely used in Europe and other parts of the world.

請參閱第1圖所示,其係習知GSM架構之系統示意圖,其中,習知GSM通訊系統9包含一使用端(Mobile Station)91、一訪問端(Visitor Location Register,VLR)92及一歸屬端(Home Location Register,HLR)93,該訪問端92耦接該使用端91及該歸屬端93,其中,假設該訪問端92與該歸屬端93之間的傳輸通道為安全通道(secure channel)SC,且該歸屬端93及該訪問端92互為信賴方。Please refer to FIG. 1 , which is a schematic diagram of a system of the conventional GSM architecture. The conventional GSM communication system 9 includes a mobile station 91 , a Visitor Location Register (VLR) 92 and a belonging. The home location register (HLR) 93 is coupled to the user terminal 91 and the home terminal 93. The transmission channel between the access terminal 92 and the home terminal 93 is assumed to be a secure channel. SC, and the home end 93 and the access end 92 are mutually trusted parties.

當該使用端91請求該訪問端92提供漫遊(roaming)服務數次時,須重覆進行習知GSM漫遊認證方法,先由該使用端91向該訪問端92請求提供服務,該訪問端92須向該歸屬端93取得一鑑別資料(即n組{RAND,SRES,Kc}),並由該鑑別資料中選取一亂數碼RAND傳送至該使用端91,待該使用端91以該亂數碼RAND產生一認證簽署碼SRES’後,將該認證簽署碼SRES’傳送至該訪問端92進行確認。藉此,該訪問端92可以認證(authenticate)該使用端91之身份是否合法,並提供合法之使用端91所需的漫遊服務。When the user terminal 91 requests the access terminal 92 to provide the roaming service several times, the conventional GSM roaming authentication method must be repeated, and the user 91 first requests the service terminal 92 to provide a service. The access terminal 92 An authentication data (ie, n groups {RAND, SRES, Kc}) is obtained from the home end 93, and a random number RAND is selected from the authentication data to be transmitted to the user terminal 91, and the user terminal 91 is used to use the random number. After the RAND generates an authentication signature code SRES', the authentication signature code SRES' is transmitted to the access terminal 92 for confirmation. Thereby, the access terminal 92 can authenticate the identity of the user 91 and provide the roaming service required by the legitimate user 91.

惟,由於該訪問端92及該歸屬端93之間需滿足互為信賴方及安全通道等假設,且該訪問端92與該歸屬端93之間的資料(例如:該鑑別資料等)係以明文方式傳輸,當該使用端91、該訪問端92及該歸屬端93之間的資料經由開放式通道(或稱公眾通道)傳遞時,並無法滿足上述互為信賴方及安全通道等假設,因此,習知GSM漫遊認證方法並無法用於開放式通道,而且,所傳輸的資料可能面臨來自其他通訊系統的威脅,例如:干擾、攔截、竊聽或欺騙等。However, since the access end 92 and the home end 93 need to meet the assumption that each other is a trusted party and a secure channel, and the data between the access end 92 and the home end 93 (for example, the authentication data, etc.) is In the plaintext mode, when the data between the user terminal 91, the access terminal 92, and the home terminal 93 is transmitted through an open channel (or a public channel), the above assumptions of mutual trust and secure channel cannot be satisfied. Therefore, the conventional GSM roaming authentication method cannot be used for open channels, and the transmitted data may face threats from other communication systems, such as interference, interception, eavesdropping or fraud.

再者,習知GSM漫遊認證方法須滿足互為信賴方及安全通道等假設,上述假設並無法相容於異質性通訊系統(例如:不同通訊系統);且通訊距離增加將提高資料面臨上述威脅之風險,因此,該訪問端92對該使用端91進行認證時,僅適用於同質性通訊系統(例如:同為GSM通訊系統)及短距離通訊,因此,無法於異質性通訊系統及長距離通訊,使習知GSM漫遊認證方法之適用範圍受限。Furthermore, the conventional GSM roaming authentication method must satisfy the assumptions of mutual trust and secure channel. The above assumptions are not compatible with heterogeneous communication systems (for example, different communication systems); and the increase of communication distance will increase the data to face the above threats. Therefore, when the access terminal 92 authenticates the user terminal 91, it is only applicable to the homogenous communication system (for example, the same GSM communication system) and short-distance communication, and therefore, the heterogeneous communication system and the long distance cannot be used. Communication makes the application of the GSM roaming authentication method limited.

另,由於該使用端91的運算能力有限,因此,針對習知GSM漫遊認證方法進行改良時,必須降低該使用端91的運算量,同時,必須與習知GSM通訊協定之漫遊認證方法相容。In addition, since the computing power of the user terminal 91 is limited, when the conventional GSM roaming authentication method is improved, the computing amount of the using terminal 91 must be reduced, and at the same time, it must be compatible with the conventional GSM communication protocol roaming authentication method. .

綜上所述,習知GSM漫遊認證方法不僅需要滿足互為信賴方及安全通道等假設,在實際使用時更衍生諸多限制與缺點,確有不便之處,亟需進一步改良,提升其實用性。In summary, the conventional GSM roaming authentication method not only needs to satisfy the assumptions of mutual trust and secure channel, but also has many limitations and shortcomings in actual use. It is inconvenient and needs further improvement to improve its practicability. .

本發明的目的乃改良上述之缺點,以提供一種GSM漫遊認證方法,藉由訪問端及歸屬端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於開放式通道傳輸資料者。The object of the present invention is to improve the above-mentioned shortcomings, and to provide a GSM roaming authentication method, in which a shared key is jointly owned by an access terminal and a home end, and is used as a basis for data authentication of both parties, and is applicable to an open channel transmission data.

本發明之次一目的,係提供一種GSM漫遊認證方法,藉由訪問端及歸屬端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於異質性通訊系統者。A second object of the present invention is to provide a GSM roaming authentication method, in which a shared key is jointly owned by an access terminal and a home end, and is used as a basis for data authentication of both parties, and is applicable to a heterogeneous communication system.

本發明之另一目的,係提供一種GSM漫遊認證方法,藉由訪問端及歸屬端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於長距離通訊者。Another object of the present invention is to provide a GSM roaming authentication method, in which a shared key is jointly owned by an access terminal and a home end, and is used as a basis for data authentication of both parties, and is suitable for long-distance communication.

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端將一國際身分碼傳送至一訪問端,用以向該訪問端請求提供漫遊服務;一詢問程序,係由該訪問端產生一挑戰碼,並將該挑戰碼及該國際身分碼傳送至一歸屬端;一回應程序,係由該歸屬端確認該國際身分碼,並產生一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該挑戰碼、該鑑別資料及一共享金鑰產生一回應碼,再將該回應碼傳送至該訪問端;一通知程序,係由該訪問端以該共享金鑰確認該回應碼,並將該亂數碼傳送至該使用端;及一首次認證程序,係由該使用端以該加密金鑰及該亂數碼產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端,由該訪問端確認該第一認證簽署碼,以作為提供漫遊服務之依據;其中,當該使用端向該訪問端請求再次提供漫遊服務時,係由該使用端以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端,由該訪問端以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該剩餘次數為一運算次數與該使用端已請求提供漫遊服務之次數的差值。A GSM roaming authentication method includes: a requesting program, wherein a user sends an international identity code to an access terminal to request a roaming service from the access terminal; and an inquiry program is generated by the access terminal a challenge code, and transmitting the challenge code and the international identity code to a home end; in a response procedure, the home end confirms the international identity code and generates a random number, waiting for the chaotic digital and an encryption gold After generating a first signing code, a second signing code, a first communication key and a second communication key, the chaotic number, the first signing code, the second signing code, and the first communication The key and the second communication key form an authentication data, and generate a response code by using the challenge code, the authentication data and a shared key, and then transmitting the response code to the access terminal; The access terminal confirms the response code by using the shared key, and transmits the random number to the user terminal; and a first authentication procedure, the user uses the encryption key and the chaotic digital to generate a first authentication signature. Code and will be the first The authentication signature code is transmitted to the access terminal, and the first authentication signature code is confirmed by the access terminal as a basis for providing the roaming service; wherein when the user terminal requests the access terminal to provide the roaming service again, the user uses the The terminal performs the operation according to the remaining number of times by using the encryption key and the chaotic digital, and generates a second authentication signature code, and transmits the second authentication signature code to the access terminal, and the second signature code is used by the access terminal. The operation is performed according to the remaining number of times, and the second authentication signing code is confirmed as a basis for providing the roaming service again, wherein the remaining number of times is a difference between the number of operations and the number of times the user has requested to provide the roaming service.

其中,該挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The challenge code is a randomly generated random number, a time stamp generated over time, or a serial number sequentially generated.

其中,該通知程序係由該訪問端確認該回應碼中的挑戰碼與該訪問端所傳送之挑戰碼是否相對應。The notification procedure is performed by the access end to confirm whether the challenge code in the response code corresponds to the challenge code transmitted by the access terminal.

其中,該通知程序係由該訪問端確認該挑戰碼無誤後,儲存該鑑別資料。The notification program stores the authentication data after the access terminal confirms that the challenge code is correct.

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端產生一第一挑戰碼,再將該第一挑戰碼及一國際身分碼傳送至一訪問端,用以向該訪問端請求提供漫遊服務;一詢問程序,係由該訪問端產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該國際身分碼傳送至一歸屬端;一回應程序,係由該歸屬端確認該國際身分碼, 並產生一認證金鑰及一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該第二挑戰碼、該鑑別資料、該認證金鑰及一共享金鑰產生一回應碼,再將該回應碼傳送至該訪問端;一通知程序,係由該訪問端以該共享金鑰確認該回應碼,再以該第一挑戰碼及該認證金鑰產生一認證碼,另將該認證碼及該亂數碼傳送至該使用端;及一首次認證程序,係由該使用端產生該認證金鑰,並以該認證金鑰確認該認證碼,再以該加密金鑰及該亂數碼產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端,由該訪問端確認該第一認證簽署碼,以作為提供漫遊服務之依據;其中,當該使用端向該訪問端請求再次提供漫遊服務時,係由該使用端以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端,由該訪問端以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該剩餘次數為該運算次數與該使用端已請求提供漫遊服務之次數的差值。A GSM roaming authentication method includes: a requesting process, wherein a first challenge code is generated by a user, and the first challenge code and an international identity code are transmitted to an access terminal for requesting the access terminal Providing a roaming service; an inquiry process, the second challenge code is generated by the access terminal, and the first challenge code, the second challenge code, and the international identity code are transmitted to a home end; The home end confirms the international identity code, And generating a certification key and a random number, after the chaotic digital and an encryption key generate a first signature code, a second signature code, a first communication key and a second communication key, The chaotic digital, the first signing code, the second signing code, the first communication key and the second communication key form an authentication data, and the second challenge code, the authentication data, the authentication key And a shared key generates a response code, and then transmits the response code to the access terminal; a notification procedure, wherein the access terminal confirms the response code by using the shared key, and then the first challenge code and the authentication The key generates an authentication code, and the authentication code and the random number are transmitted to the use end; and a first authentication procedure, the authentication key is generated by the user end, and the authentication code is confirmed by the authentication key, And generating, by the encryption key and the chaotic digital, a first authentication signature code, and transmitting the first authentication signature code to the access terminal, and the access terminal confirms the first authentication signature code to provide roaming service. According to; where, when the user uses the access When requesting to provide the roaming service again, the user uses the encryption key and the chaotic digital to calculate according to a remaining number of times, and generates a second authentication signature code, and transmits the second authentication signature code to the access terminal. And the accessing end performs the operation according to the remaining number of times by the second signing code, and confirms the second authentication signing code as a basis for providing the roaming service again, wherein the remaining number of times is the number of operations and the used end has been The difference in the number of times a roaming service is requested.

其中,該第一挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The first challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated.

其中,該第二挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The second challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated.

其中,該通知程序係由該訪問端確認該回應碼中的第二挑戰碼與該訪問端所傳送之第二挑戰碼是否相對應。The notification procedure is performed by the access end to confirm whether the second challenge code in the response code corresponds to the second challenge code transmitted by the access terminal.

其中,該歸屬端及該使用端係以該第一挑戰碼及該加密金鑰產生該認證金鑰。The home end and the user end generate the authentication key by using the first challenge code and the encryption key.

其中,該歸屬端及該使用端係將該第一挑戰碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證金鑰。The home end and the user end operate the first challenge code and the encryption key according to a hash function to generate the authentication key.

其中,該訪問端確認該挑戰碼無誤後,儲存該鑑別資料及該認證金鑰。After the access terminal confirms that the challenge code is correct, the authentication data and the authentication key are stored.

其中,該使用端係將該亂數碼及該加密金鑰依據一第一雜湊函數進行運算,而產生該認證簽署碼。The usage end performs the operation of the chaotic digital and the encryption key according to a first hash function to generate the authentication signature code.

其中,該歸屬端將該亂數碼及該加密金鑰依據一第一雜湊函數及該運算次數進行運算,而產生該第一簽署碼。The home end generates the first signature code by computing the chaotic digital and the encryption key according to a first hash function and the number of operations.

其中,該歸屬端將該亂數碼及該加密金鑰依據一第二雜湊函數及該運算次數進行運算,而產生該第一通訊金鑰。The home end generates the first communication key by computing the chaotic digital and the encryption key according to a second hash function and the number of operations.

其中,該歸屬端係將該亂數碼及該加密金鑰依據一第一雜湊函數進行運算,而產生該第二簽署碼。The home end generates the second signature code by computing the chaotic digital and the encryption key according to a first hash function.

其中,該歸屬端係將該亂數碼及該加密金鑰依據一第二雜湊函數進行運算,而產生該第二通訊金鑰。The home end generates the second communication key by computing the chaotic digital and the encryption key according to a second hash function.

為讓本發明之上述及其他目的、特徵及優點能更明顯易懂,下文特舉本發明之較佳實施例,並配合所附圖式,作詳細說明如下:The above and other objects, features and advantages of the present invention will become more <RTIgt;

本發明全文所述之「使用端」(Mobile Station,MS),係指GSM通訊系統中,可以供使用者隨身攜帶之行動收發訊號裝置(即手機,Mobile Phone),係本發明所屬技術領域中具有通常知識者可以理解。The "Mobile Station" (MS) in the GSM communication system refers to an action transceiver device (ie, a mobile phone) that can be carried by a user in the GSM communication system, and is in the technical field of the present invention. Those with ordinary knowledge can understand.

本發明全文所述之「訪問端」(Visitor Location Register,VLR),係指GSM通訊系統中,可以提供使用端漫遊相關服務內容之訪問者位置暫存系統或網路,係本發明所屬技術領域中具有通常知識者可以理解。The "Visitor Location Register" (VLR) as described in the full text of the present invention refers to a visitor location temporary storage system or network that can provide usage of roaming related service content in a GSM communication system, and is a technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「歸屬端」(Home Location Register,HLR),係指GSM通訊系統中,可以提供使用端註冊或登錄相關服務內容之歸屬者位置暫存系統或網路,係本發明所屬技術領域中具有通常知識者可以理解。The "Home Location Register" (HLR) described in the full text of the present invention refers to a MME communication system, which can provide a subscriber location registration system or network for registering or logging in to the relevant service content, which belongs to the present invention. Those of ordinary skill in the art will understand.

本發明全文所述之「耦接」(coupling),係指二裝置之間藉由有線實體、無線媒介或其組合等方式,而使該二裝置之資料可以相互傳遞,係本發明所屬技術領域中具有通常知識者可以理解。The term "coupling" as used throughout the scope of the present invention means that the data of the two devices can be transmitted to each other by means of a wired entity, a wireless medium, or a combination thereof, and the technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「國際身分碼」(International Mobile Subscriber Identity,IMSI),係指使用端申請註冊時,由歸屬端指定之數碼,供歸屬端辨識使用端之身分,係本發明所屬技術領域中具有通常知識者可以理解。The International Mobile Subscriber Identity (IMSI) as described in the full text of the present invention refers to the identity specified by the home end when the user applies for registration, and the identity of the user is recognized by the home end, which is the technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「加密金鑰」(ciphering key),係指使用端與歸屬端共有之金鑰,用以進行資料加/解密,係本發明所屬技術領域中具有通常知識者可以理解。The "ciphering key" as used throughout the present invention refers to a key shared by the user end and the home end for data encryption/decryption, which can be understood by those having ordinary knowledge in the technical field to which the present invention pertains.

本發明全文所述之「共享金鑰」(sharing key),係指訪問端與歸屬端共有之金鑰,用以進行資料加/解密,係本發明所屬技術領域中具有通常知識者可以理解。The "sharing key" as used throughout the present invention refers to a key shared by the access end and the home end for data encryption/decryption, which can be understood by those having ordinary knowledge in the technical field to which the present invention pertains.

本發明全文所述之「認證金鑰」(authenticating key),係指使用端及歸屬端皆可自行產生之金鑰,用以認證使用端之身分,係本發明所屬技術領域中具有通常知識者可以理解。The "authenticating key" as used throughout the present invention refers to a key that can be generated by both the user end and the home end to authenticate the identity of the user, and is a person having ordinary knowledge in the technical field to which the present invention pertains. Can understand.

請參閱第2圖所示,其係本發明GSM漫遊認證方法之系統示意圖,包含一使用端(Mobile Station)1、一訪問端(Visitor Location Register,VLR)2及一歸屬端(Home Location Register,HLR)3,該訪問端2耦接該使用端1及該歸屬端3,該使用端1、該訪問端2及該歸屬端3之構造係本發明所屬領域具有通常知識者可以理解,在此容不贅述。Referring to FIG. 2, it is a system diagram of the GSM roaming authentication method of the present invention, including a mobile station 1, a Visitor Location Register (VLR) 2, and a Home Location Register (Home Location Register, HLR) 3, the access terminal 2 is coupled to the user terminal 1 and the home terminal 3, and the configuration of the user terminal 1, the access terminal 2 and the home terminal 3 is understood by those skilled in the art to which the present invention pertains. I will not repeat them.

請一併參閱第3及4圖所示,其係本發明GSM漫遊認證方法之流程圖及第一實施例的資料示意圖,包含一請求程序S1、一詢問程序S2、一回應程序S3、一通知程序S4、一首次認證程序S5及一再次認證程序S6。其中:Please refer to FIG. 3 and FIG. 4 together, which is a flowchart of the GSM roaming authentication method of the present invention and a data diagram of the first embodiment, including a request procedure S1, an inquiry procedure S2, a response procedure S3, and a notification. The program S4, a first authentication program S5, and a re-authentication program S6. among them:

該請求程序S1,係由該使用端1將一國際身分碼(IMSI)傳送至一訪問端2,用以向該訪問端2請求提供漫遊服務,之後,進行該詢問程序S2。詳言之,由於該使用端1在申請註冊時,該國際身分碼已同時儲存於該使用端1及該歸屬端3,例如:466-920-xxxxxxxxx(15碼),因此,當該使用端1移動至該訪問端2之通訊範圍內時,該使用端1可向該訪問端2請求提供漫遊服務,此時,由於該訪問端2不具備用以認證該使用端1之資料,因此,該訪問端2無法確認該使用端1之身分是否合法,而須向該歸屬端3取得有關該使用端1之資料,用以認證該使用端1之身分,待確認該使用端1為合法身分後,該訪問端2才能提供該使用端1所需之漫遊服務內容。The requesting program S1 transmits an international identity code (IMSI) to the access terminal 2 by the user terminal 1 to request the access terminal 2 to provide the roaming service, and then performs the inquiry procedure S2. In detail, since the user 1 is applying for registration, the international identity code is simultaneously stored in the user terminal 1 and the home terminal 3, for example, 466-920-xxxxxxxxx (15 yards), therefore, when the user terminal When the user 1 moves to the communication range of the access terminal 2, the user terminal 1 can request the roaming service to be provided to the access terminal 2. In this case, since the access terminal 2 does not have the information for authenticating the user terminal 1, The access terminal 2 cannot confirm whether the identity of the user terminal 1 is legal, but obtains information about the user terminal 1 from the home terminal 3 to authenticate the identity of the user terminal 1, and confirms that the user terminal 1 is a legal identity. After that, the access terminal 2 can provide the roaming service content required by the user terminal 1.

該詢問程序S2,係由該訪問端2產生一挑戰碼,並將該挑戰碼及該國際身分碼傳送至該歸屬端3,之後,進行該回應程序S3。其中,該詢問程序S2係由該訪問端2依序進行一步驟S21及一步驟S22。The inquiry program S2 generates a challenge code from the access terminal 2, and transmits the challenge code and the international identity code to the home terminal 3, and then performs the response procedure S3. The inquiry program S2 is sequentially performed by the access terminal 2 in a step S21 and a step S22.

該步驟S21係由該訪問端2接收該國際身分碼及產生該挑戰碼。詳言之,當該訪問端2接收該國際身分碼後,即得知該使用端1請求該訪問端2提供漫遊服務,此時,該訪問端2將會儲存該國際身分碼,並向該歸屬端3取得有關認證該使用端1之資料,因此,為確保由該歸屬端3所取得資料的有效性,該訪問端2將會產生該挑戰碼,並加以儲存,該挑戰碼係為隨機產生、不可重複及單次使用之數值,例如:隨機產生之亂數、隨時間產生之時戳或依序產生之序號等。In step S21, the international identity code is received by the access terminal 2 and the challenge code is generated. In detail, when the access terminal 2 receives the international identity code, it knows that the user 1 requests the access terminal 2 to provide the roaming service. At this time, the access terminal 2 will store the international identity code and The home terminal 3 obtains information about the authentication of the user terminal 1. Therefore, in order to ensure the validity of the data obtained by the home terminal 3, the access terminal 2 will generate the challenge code and store it. The challenge code is random. Values that are generated, non-repeatable, and single-use, such as randomly generated random numbers, time stamps generated over time, or serial numbers generated sequentially.

該步驟S22係由該訪問端2傳送該挑戰碼及該國際身分碼至該歸屬端3。詳言之,由於該使用端1及該歸屬端3同時存有該國際身分碼,因此,可憑藉該國際身分碼,由該歸屬端3取得有關認證該使用端1之資料,並憑藉該挑戰碼或該挑戰碼之對應數值是否由該歸屬端3正確傳回,來確保該使用端1之資料的有效性。In step S22, the challenge code and the international identity code are transmitted by the access terminal 2 to the home terminal 3. In detail, since the user 1 and the home 3 have the international identity code at the same time, the home terminal 3 can obtain the information about authenticating the user terminal 1 by virtue of the international identity code, and the challenge is Whether the code or the corresponding value of the challenge code is correctly transmitted back by the home terminal 3 ensures the validity of the data of the user terminal 1.

該回應程序S3,係由該歸屬端3確認該國際身分碼,並產生一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該挑戰碼、該鑑別資料及一共享金鑰產生一回應碼,再將該回應碼傳送至該訪問端2。之後,進行該通知程序S4。其中,該回應程序S3係由該歸屬端3依序進行一步驟S31、一步驟S32、一步驟S33、一步驟S34、一步驟S35、一步驟S36及一步驟S37。The response procedure S3 confirms the international identity code by the home terminal 3, and generates a random number, and the first signature code, a second signature code, and a first communication are generated by the random number and an encryption key. After the key and the second communication key, the random number, the first signing code, the second signing code, the first communication key and the second communication key form an authentication data, and the challenge is The code, the authentication data and a shared key generate a response code, and the response code is transmitted to the access terminal 2. Thereafter, the notification program S4 is performed. The response procedure S3 is performed by the home terminal 3 in sequence with a step S31, a step S32, a step S33, a step S34, a step S35, a step S36 and a step S37.

該步驟S31係由該歸屬端3接收該國際身分碼,並確認該國際身分碼是否無誤。詳言之,由於該歸屬端3及該使用端1共同擁有同一國際身分碼,因此,該歸屬端3可以將已儲存之國際身分碼與接收自該訪問端2的國際身分碼相比對,若比對結果無誤(即兩者相同),則繼續進行該步驟S32,否則,停止進行後續步驟。In step S31, the international identity code is received by the home terminal 3, and it is confirmed whether the international identity code is correct. In detail, since the home terminal 3 and the user terminal 1 share the same international identity code, the home terminal 3 can compare the stored international identity code with the international identity code received from the access terminal 2. If the result of the comparison is correct (ie, the two are the same), then step S32 is continued, otherwise, the subsequent steps are stopped.

該步驟S32係由該歸屬端3產生該亂數碼,其中,該亂數碼為隨機產生、不可重複及單次使用之數值。In step S32, the chaotic number is generated by the home terminal 3, wherein the chaotic number is a value that is randomly generated, non-repeatable, and single-use.

該步驟S33係由該歸屬端3以該亂數碼及一加密金鑰產生該第一簽署碼及該第二簽署碼。詳言之,該加密金鑰係事先儲存於該歸屬端3及該使用端1,該歸屬端3可由該亂數碼及該加密金鑰依據一第一雜湊函數及一運算次數進行運算,而產生該第一簽署碼,用以鑑別該使用端1之身分。該第一簽署碼之運算方式如下式(1)所示:In step S33, the first signing code and the second signing code are generated by the home terminal 3 by using the random number and an encryption key. In detail, the encryption key is stored in the local terminal 3 and the user terminal 1 in advance, and the home terminal 3 can be operated by the chaotic digital and the encryption key according to a first hash function and a number of operations. The first signing code is used to identify the identity of the user terminal 1. The operation method of the first signature code is as shown in the following formula (1):

s m =H m (K 31 ,r 0 ) (1) s m = H m ( K 31 , r 0 ) (1)

其中,sm 為該第一簽署碼;K31 為該歸屬端3及該使用端1共有的加密金鑰;r0 為該亂數碼;H為單向雜湊函數(即該第一雜湊函數),例如:A3單向雜湊函數等;m為該運算次數,例如:10,即重覆進行運算之次數。Where s m is the first signing code; K 31 is the encryption key shared by the home end 3 and the user end 1; r 0 is the chaotic number; H is a one-way hash function (ie, the first hash function) For example: A3 one-way hash function, etc.; m is the number of operations, for example: 10, that is, the number of times of repeated operations.

而且,該歸屬端3可由該亂數碼及該加密金鑰依據該第一雜湊函數進行運算,而產生該第二簽署碼,用以鑑別該使用端1之身分。該第二簽署碼之運算方式如下式(2)所示:Moreover, the home end 3 can be operated by the chaotic digital and the encryption key according to the first hash function, and the second signature code is generated to identify the identity of the user terminal 1. The operation method of the second signature code is as shown in the following formula (2):

s 0 =H (K 31 ,r 0 ) (2) s 0 = H ( K 31 , r 0 ) (2)

其中,s0 為該第二簽署碼;K31 為該歸屬端3及該使用端1共有的加密金鑰;r0 為該亂數碼,H為單向雜湊函數(即該第一雜湊函數)。Where s 0 is the second signature code; K 31 is the encryption key shared by the home terminal 3 and the user terminal 1; r 0 is the chaotic number, and H is a one-way hash function (ie, the first hash function) .

該步驟S34係由該歸屬端3以該亂數碼及該加密金鑰產生該第一通訊金鑰。詳言之,該歸屬端3可由該亂數碼及該加密金鑰依據一第二雜湊函數及該運算次數進行運算,而產生該第一通訊金鑰,用以鑑別該使用端1之身分。該第一通訊金鑰之運算方式如下式(3)所示:In step S34, the first communication key is generated by the home terminal 3 by the random number and the encryption key. In detail, the home end 3 can be operated by the chaotic digital and the encryption key according to a second hash function and the number of operations, and the first communication key is generated to identify the identity of the user terminal 1. The operation method of the first communication key is as follows (3):

k m =F m (K 31 ,r 0 )  (3) k m = F m (K 31 ,r 0 ) (3)

其中,km 為該第一簽署碼;K31 為該歸屬端3及該使用端1共有的加密金鑰;r0 為該亂數碼,F為單向雜湊函數(即該第二雜湊函數),例如:A8單向雜湊函數等;m為該運算次數,例如:10,即重覆進行運算之次數。Where k m is the first signing code; K 31 is the encryption key shared by the home end 3 and the user end 1; r 0 is the chaotic number, and F is a one-way hash function (ie, the second hash function) For example, A8 one-way hash function, etc.; m is the number of operations, for example: 10, that is, the number of times of repeated operations.

而且,該歸屬端3可由該亂數碼及該加密金鑰依據該第二雜湊函數進行運算,而產生該第二通訊金鑰,用以鑑別該使用端1之身分。該第二通訊金鑰之運算方式如下式(4)所示:Moreover, the home end 3 can be operated by the chaotic digital and the encryption key according to the second hash function, and the second communication key is generated to identify the identity of the user terminal 1. The second communication key is calculated as shown in the following equation (4):

k 0 =F(K 31 ,r 0 )  (4) k 0 = F(K 31 ,r 0 ) (4)

其中,k0 為該第二通訊金鑰;K31 為該歸屬端3及該使用端1共有的加密金鑰;r0 為該亂數碼;F為單向雜湊函數(即該第二雜湊函數)。Where k 0 is the second communication key; K 31 is the encryption key shared by the home end 3 and the user end 1; r 0 is the chaotic number; F is a one-way hash function (ie, the second hash function) ).

該步驟S35係由該歸屬端3將該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成該鑑別資料。詳言之,該鑑別資料係由可以辨識該使用端1的資料(例如:該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰)所組成,該鑑別資料之格式如下式(5)所示:In step S35, the home end 3 composes the hash data, the first sign code, the second sign code, the first communication key and the second communication key into the authentication data. In detail, the authentication data is obtained by identifying the data of the user terminal 1 (for example, the messy number, the first signing code, the second signing code, the first communication key, and the second communication key) The composition of the identification data is as shown in the following formula (5):

B =(r 0 ,s m ,k m ,s 0 ,k 0 ) (5) B =( r 0 , s m , k m , s 0 , k 0 ) (5)

其中,B為該鑑別資料;r0 為該亂數碼;sm 為該第一簽署碼;km 為該第一通訊金鑰;s0 為該第二簽署碼;k0 為該第二通訊金鑰。Where B is the authentication data; r 0 is the chaotic number; s m is the first signature; k m is the first communication key; s 0 is the second signature; k 0 is the second communication Key.

該步驟S36係由該歸屬端3以該挑戰碼、該鑑別資料及該共享金鑰產生該回應碼。詳言之,藉由該共享金鑰對資料進行加解密,可以確保資料的安全性,當該歸屬端3傳輸資料至該訪問端2時,可以防止來自其他通訊系統的威脅,例如:干擾、攔截、竊聽或欺騙等。再者,該歸屬端3可以選擇將該挑戰碼傳回該訪問端2,或由該挑戰碼產生一對應數值,例如:該對應數值為該挑戰碼的二進位補數等,再將該對應數值傳回該訪問端2,作為該訪問端2識別該歸屬端3之機制。在此實施例中,係以該歸屬端3將該挑戰碼傳回該訪問端2作為實施態樣。接著,該歸屬端3將該挑戰碼及該鑑別資料藉由該共享金鑰進行加密,而產生該回應碼,其中,該回應碼之產生方式為習知可以藉由金鑰進行資料加密之方式,如下式(6)所示:In step S36, the home end 3 generates the response code by using the challenge code, the authentication data and the shared key. In detail, the data can be encrypted and decrypted by the shared key to ensure the security of the data. When the local terminal 3 transmits the data to the access terminal 2, the threat from other communication systems can be prevented, for example, interference, Intercept, eavesdropping or deception. Furthermore, the home end 3 may choose to transmit the challenge code back to the access terminal 2, or generate a corresponding value from the challenge code, for example, the corresponding value is the binary complement of the challenge code, etc., and the corresponding The value is passed back to the access terminal 2 as a mechanism for the access terminal 2 to identify the home terminal 3. In this embodiment, the challenge code is transmitted back to the access terminal 2 by the home terminal 3 as an implementation aspect. Then, the home end 3 encrypts the challenge code and the authentication data by using the shared key, and generates the response code, wherein the response code is generated in the manner that the data can be encrypted by using a key. , as shown in the following formula (6):

其中,C為該回應碼;E為加密函數,例如:DES或3DES等對稱式加密演算法;K23 為該訪問端2及該歸屬端3共有的共享金鑰;N為該挑戰碼或由該挑戰碼所產生之對應數值;B為該鑑別資料。Where C is the response code; E is an encryption function, such as a symmetric encryption algorithm such as DES or 3DES; K 23 is a shared key shared by the access terminal 2 and the home end 3; N is the challenge code or The corresponding value generated by the challenge code; B is the identification data.

該步驟S37係由該歸屬端3將該回應碼傳送至該訪問端2。詳言之,該回應碼係由該歸屬端3經由開放式通道傳送至該訪問端2。In step S37, the response code is transmitted by the home terminal 3 to the access terminal 2. In detail, the response code is transmitted by the home terminal 3 to the access terminal 2 via an open channel.

該通知程序S4,係由該訪問端2以該共享金鑰確認該回應碼,並將該亂數碼傳送至該使用端1。之後,進行該首次認證程序S5。其中,該通知程序S4係由該訪問端2依序進行一步驟S41、一步驟S42及一步驟S43。The notification program S4 confirms the response code by the access terminal 2 with the shared key, and transmits the random number to the user terminal 1. Thereafter, the first authentication procedure S5 is performed. The notification program S4 performs a step S41, a step S42, and a step S43 in sequence from the access terminal 2.

該步驟S41係由該訪問端2接收該回應碼,並以該共享金鑰確認該回應碼。詳言之,由於該訪問端2與該歸屬端3共同擁有該共享金鑰,因此,該訪問端2可由該共享金鑰對該回應碼進行解密,其解密方式為該歸屬端3加密方式之對應解密方式,在此容不贅述,該訪問端2可由該回應碼解密後的資料(例如:該挑戰碼及該鑑別資料),確認該回應碼是否包含該訪問端2所傳送之挑戰碼或該挑戰碼之對應數值,即確認該回應碼中的挑戰碼與該訪問端所傳送之挑戰碼是否相對應,若確認結果為「是」,該訪問端2儲存該鑑別資料,否則,停止進行後續步驟,藉此確認該回應碼是否由合法的歸屬端3傳回。In step S41, the response code is received by the access terminal 2, and the response code is confirmed by the shared key. In detail, since the access terminal 2 shares the shared key with the home terminal 3, the access terminal 2 can decrypt the response code by the shared key, and the decryption mode is the encryption mode of the home end 3 Corresponding to the decryption mode, the access terminal 2 can use the data decrypted by the response code (for example, the challenge code and the authentication data) to confirm whether the response code includes the challenge code transmitted by the access terminal 2 or Corresponding value of the challenge code, that is, whether the challenge code in the response code corresponds to the challenge code transmitted by the access terminal, and if the confirmation result is “Yes”, the access terminal 2 stores the authentication data, otherwise, stops the operation. A subsequent step, thereby confirming whether the response code is transmitted back by the legitimate home terminal 3.

該步驟S42係由該訪問端2儲存該鑑別資料。詳言之,由於該鑑別資料包含該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰,係判斷該使用端1之身份是否合法之重要資料,因此,該鑑別資料須由該訪問端2進行儲存。In step S42, the authentication data is stored by the access terminal 2. In detail, since the authentication data includes the random number, the first signing code, the second signing code, the first communication key and the second communication key, it is determined whether the identity of the user 1 is legal. Important information, therefore, the authentication data must be stored by the access terminal 2.

該步驟S43係由該訪問端2將該亂數碼傳送至該使用端1。詳言之,該訪問端2係由該鑑別資料之中選擇該亂數碼,待將該亂數碼進行紀錄後,再傳送至該使用端1,用以由該使用端1是否正確傳回該亂數碼對應之簽署碼,作為認證該使用端1之依據。In step S43, the random number is transmitted to the user terminal 1 by the access terminal 2. In detail, the access terminal 2 selects the random number from the authentication data, and after the random number is recorded, it is transmitted to the user terminal 1 for whether the user 1 correctly returns the mess. The signature code corresponding to the digital is used as the basis for authenticating the user terminal 1.

該首次認證程序S5,係由該使用端1以該加密金鑰及該亂數碼依據該運算次數產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端2,由該訪問端2確認該第一認證簽署碼,以作為提供漫遊服務之依據。其中,該首次認證程序S5係由該使用端1進行一步驟S51及一步驟S52,再由該訪問端2進行一步驟S53。The first authentication program S5 is configured to generate a first authentication signing code according to the number of operations by the user terminal 1 according to the encryption key and the chaotic number, and transmit the first authentication signing code to the access terminal 2, by the The access terminal 2 confirms the first authentication signature code as a basis for providing roaming services. The first authentication procedure S5 is performed by the user terminal 1 in a step S51 and a step S52, and the access terminal 2 performs a step S53.

該步驟S51係由該使用端1接收該訪問端2所傳送之亂數碼,並以該亂數碼及該加密金鑰依據該第一雜湊函數及該運算次數(例如:10次)產生該第一認證簽署碼。詳言之,由於該使用端1與該歸屬端3共同擁有該加密金鑰,且該使用端1與該歸屬端3皆具有產生該第一簽署碼之能力,例如:利用A3單向雜湊函數等方式重覆進行運算10次,因此,該使用端1可以由該亂數碼及該加密金鑰重覆進行運算,而產生該第一認證簽署碼。In step S51, the user 1 receives the random number transmitted by the access terminal 2, and generates the first number according to the first hash function and the number of operations (for example, 10 times) by the random number and the encryption key. Certification signing code. In detail, since the user 1 and the home 3 share the encryption key, and the user 1 and the home 3 have the ability to generate the first signature, for example, using the A3 one-way hash function. The operation is repeated 10 times in an equal manner. Therefore, the user terminal 1 can be repeatedly operated by the chaotic digital and the encryption key to generate the first authentication signature code.

該步驟S52係由該使用端1將該第一認證簽署碼傳送至該訪問端2。詳言之,由於該第一認證簽署碼係由該使用端1以相同於該歸屬端3之第一簽署碼的運算方式所產生,因此,該第一認證簽署碼可供該訪問端2作為認證該使用端1的資料。In step S52, the first authentication signing code is transmitted by the user terminal 1 to the access terminal 2. In detail, since the first authentication signature code is generated by the user terminal 1 in the same manner as the first signature code of the home terminal 3, the first authentication signature code is available to the access terminal 2 as The data of the user 1 is authenticated.

該步驟S53係由該訪問端2確認該第一認證簽署碼。詳言之,由於該訪問端2已預先儲存該鑑別資料,因此,可由該鑑別資料中找出該第一簽署碼(即sm ),作為確認該第一認證簽署碼之依據,若該第一認證簽署碼與該第一簽署碼相符,則該訪問端2認證該使用端1之身分為合法身分,並提供該使用端1所需之漫遊服務內容。In step S53, the first authentication signing code is confirmed by the access terminal 2. In detail, since the access terminal 2 has previously stored the authentication data, the first signature code (ie, s m ) can be found in the authentication data as a basis for confirming the first authentication signature code. When the authentication signing code matches the first signing code, the access terminal 2 authenticates that the user terminal 1 is classified into a legal identity, and provides the roaming service content required by the user terminal 1.

其中,當該使用端1向該訪問端2請求再次(即非首次)提供漫遊服務時,係進行該再次認證程序S6。Wherein, when the user terminal 1 requests the access terminal 2 to provide the roaming service again (ie, not for the first time), the re-authentication procedure S6 is performed.

該再次認證程序S6係由該使用端1以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端2,由該訪問端2以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該剩餘次數為該運算次數與該使用端1已請求提供漫遊服務之次數的差值。其中,該再次認證程序S6係由該使用端1進行一步驟S61及一步驟S62,再由該訪問端2進行一步驟S63。The re-authentication procedure S6 is performed by the user terminal 1 by using the encryption key and the chaotic digit according to a remaining number of times, to generate a second authentication signature code, and transmitting the second authentication signature code to the access terminal 2 The access terminal 2 performs the operation according to the remaining number of times with the second signature code, and confirms the second authentication signature code as a basis for providing the roaming service again, wherein the remaining number of times is the number of operations and the usage end 1 The difference in the number of times a roaming service has been requested. The re-authentication procedure S6 is performed by the user terminal 1 in a step S61 and a step S62, and the access terminal 2 performs a step S63.

該步驟S61係由該使用端1以該加密金鑰及該亂數碼依據該剩餘次數進行運算,而產生一第二認證簽署碼,其中,該剩餘次數為該運算次數與該使用端1已請求提供漫遊服務之次數的差值。詳言之,由於該使用端1與該歸屬端3共同擁有該加密金鑰,且該使用端1與該歸屬端3皆具有產生該第二簽署碼之能力,因此,當該使用端1再次請求該訪問端2提供漫遊服務時,該使用端1可以由該亂數碼及該加密金鑰進行單向雜湊函數運算,並重覆該剩餘次數,而產生該第二認證簽署碼,例如:若該運算次數為10次,則當該使用端1請求該訪問端2提供第2次漫遊服務時,由於該訪問端2已提供1次漫遊服務,則該剩餘次數為9次,因此,該使用端1須以該加密金鑰及該亂數碼重複進行運算9次,而產生該第二認證簽署碼。依此類推,當該使用端1第3、4、...次請求該訪問端2提供漫遊服務時,由於該訪問端2已提供2、3、...次漫遊服務,因此,該使用端1須以該加密金鑰及該亂數碼重複進行運算8、7、...次。The step S61 is performed by the user terminal 1 by using the encryption key and the chaotic number according to the remaining number of times, to generate a second authentication signature code, wherein the remaining number of times is the number of operations and the user 1 has requested The difference in the number of roaming services provided. In detail, since the user 1 and the home terminal 3 jointly own the encryption key, and both the user terminal 1 and the home terminal 3 have the ability to generate the second signature code, when the user terminal 1 is used again, When requesting the access terminal 2 to provide the roaming service, the user terminal 1 may perform a one-way hash function operation by the chaotic digital and the encryption key, and repeat the remaining number of times to generate the second authentication signature code, for example: When the number of operations is 10, when the user 1 requests the access terminal 2 to provide the second roaming service, since the access terminal 2 has provided one roaming service, the remaining number of times is 9 times. Therefore, the user terminal 1 The operation must be repeated 9 times with the encryption key and the chaotic number to generate the second authentication signature code. And so on, when the user 1 requests the access terminal 2 to provide the roaming service 3, 4, ... times, since the access terminal 2 has provided 2, 3, ... roaming services, the use End 1 must repeat the operation 8, 7 times, with the encryption key and the chaotic number.

該步驟S62係由該使用端1將該第二認證簽署碼傳送至該訪問端2。詳言之,由於該第二認證簽署碼係由該使用端1以相同於該歸屬端3之第二簽署碼的運算方式所產生,因此,該第二認證簽署碼可供該訪問端2作為再次認證該使用端1的資料。In step S62, the second authentication signature code is transmitted to the access terminal 2 by the user terminal 1. In detail, since the second authentication signature code is generated by the user terminal 1 in the same manner as the second signature code of the home terminal 3, the second authentication signature code is available to the access terminal 2 as The data of the user 1 is authenticated again.

該步驟S63係由該訪問端2以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼。詳言之,由於該訪問端2已預先儲存該鑑別資料,因此,該訪問端2可由該鑑別資料中找出該亂數碼,由該亂數碼及該加密金鑰進行單向雜湊函數運算,並重覆該剩餘次數,而產生一再次認證確認碼,該再次認證確認碼之值應與該第二認證簽署碼之值相同,因此,可由該再次認證確認碼確認該第二認證簽署碼是否正確,若確認結果為正確,該訪問端2將會再次提供該使用端1所需之漫遊服務內容。In step S63, the access terminal 2 performs the operation according to the remaining number of times with the second signature code, and confirms the second authentication signature code. In detail, since the access terminal 2 has previously stored the authentication data, the access terminal 2 can find the chaotic digital data from the authentication data, perform a one-way hash function operation by the chaotic digital and the encryption key, and Overwriting the remaining number of times, and generating a re-authentication confirmation code, the value of the re-authentication confirmation code should be the same as the value of the second authentication-signature code, and therefore, the re-authentication confirmation code can be used to confirm whether the second authentication-signed code is correct. If the confirmation result is correct, the access terminal 2 will again provide the roaming service content required by the user terminal 1.

綜上所述,本發明GSM漫遊認證方法之第一實施例可以提供一種單向認證方法,藉由該訪問端2及該歸屬端3共同擁有該共享金鑰,作為雙方資料鑑別之依據,因此,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。In summary, the first embodiment of the GSM roaming authentication method of the present invention can provide a one-way authentication method, and the shared terminal is jointly owned by the access terminal 2 and the home end 3 as the basis for data authentication of both parties. It can transmit data in the case of open channels, heterogeneous communication systems and long-distance communication, and ensure the security of data and avoid data interference, interception, eavesdropping or deception.

再者,利用單向雜湊函數之向後雜湊鏈運算,當該使用端1向該訪問端2再次請求提供漫遊服務時,該訪問端2可直接產生驗證該使用端1之身分的資料,並不需要再次向該歸屬端3取得驗證身份的資料,可以降低該歸屬端3及該訪問端2之間的資料傳輸量,並可降低該歸屬端3的運算負荷,當資料傳輸時,可以降低資料受到干擾、攔截、竊聽或欺騙的機會,而提高資料安全性。Moreover, by using the backward hash chain operation of the one-way hash function, when the user terminal 1 requests the roaming service again to the access terminal 2, the access terminal 2 can directly generate the data for verifying the identity of the user terminal 1, and The data of the authentication identity needs to be obtained again from the home end 3, the data transmission amount between the home end 3 and the access terminal 2 can be reduced, and the computing load of the home end 3 can be reduced, and the data can be reduced when the data is transmitted. Improve data security by being interrupted, intercepted, eavesdropped, or deceived.

請參閱第3及5圖所示,其係本發明GSM漫遊認證方法之流程圖及第二實施例的資料示意圖,本發明之第二實施例係提供一種雙向認證方法,包含一請求程序S1’、一詢問程序S2’、一回應程序S3’、一通知程序S4’、一首次認證程序S5’及一再次認證程序S6’。其中:Please refer to FIG. 3 and FIG. 5 , which are a flowchart of the GSM roaming authentication method of the present invention and a data schematic diagram of the second embodiment. The second embodiment of the present invention provides a two-way authentication method, including a request procedure S1 ′. An inquiry program S2', a response program S3', a notification program S4', a first authentication program S5', and a re-authentication program S6'. among them:

該請求程序S1’,係包含一步驟S11’及一步驟S12’,由該使用端1產生一第一挑戰碼,再將該第一挑戰碼及一國際身分碼傳送至該訪問端2,用以向該訪問端2請求提供漫遊服務,其中,該第一挑戰碼的功用為驗證訪問端2之身分;該第一挑戰碼與該第一實施例之挑戰碼的產生方式大致相同,在此容不贅述。The requesting program S1' includes a step S11' and a step S12'. The first challenge code is generated by the user terminal 1, and the first challenge code and an international identity code are transmitted to the access terminal 2, Requesting to provide the roaming service to the access terminal 2, wherein the function of the first challenge code is to verify the identity of the access terminal 2; the first challenge code is generated in substantially the same manner as the challenge code of the first embodiment, where I will not repeat them.

該詢問程序S2’,係包含一步驟S21’及一步驟S22’。由該訪問端2接收並儲存該第一挑戰碼及該國際身分碼,且產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該國際身分碼傳送至一歸屬端3,其中,該第二挑戰碼與該第一實施例之挑戰碼的功用及產生方式大致相同,在此容不贅述。The inquiry program S2' includes a step S21' and a step S22'. Receiving and storing the first challenge code and the international identity code by the access terminal 2, and generating a second challenge code, and transmitting the first challenge code, the second challenge code, and the international identity code to a local end 3, wherein the second challenge code is substantially the same as the function and the generation manner of the challenge code of the first embodiment, and details are not described herein.

該回應程序S3’包含一步驟S31’、一步驟S32’、一步驟S33’、一步驟S34’、一步驟S35’、一步驟S36’、一步驟S37’及一步驟S38’,由該歸屬端3確認該國際身分碼,並產生一認證金鑰及一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該第二挑戰碼、該鑑別資料、該認證金鑰及一共享金鑰產生一回應碼,再將該回應碼傳送至該訪問端2。其中,該認證金鑰之運算方式係如下式(7)所示:The response program S3' includes a step S31', a step S32', a step S33', a step S34', a step S35', a step S36', a step S37' and a step S38', from the home end 3 confirming the international identity code, and generating a certification key and a random number, to generate a first signature code, a second signature code, a first communication key and a first number from the chaotic digital and an encryption key After the second communication key, the first signing code, the second signing code, the first communication key and the second communication key form an authentication data, and the second challenge code, the authentication data, the The authentication key and a shared key generate a response code, and the response code is transmitted to the access terminal 2. The calculation method of the authentication key is as shown in the following formula (7):

K auth =F(K 31 ,N 1 )  (7) K auth = F(K 31 ,N 1 ) (7)

其中,Kauth 為該認證金鑰;K31 為該歸屬端3及該使用端1共有的加密金鑰;N1 為該第一挑戰碼;F為一雜湊函數,較佳為單向雜湊函數,例如:A8單向雜湊函數等。另,該回應碼之產生方式係如下式(8)所示:Where K auth is the authentication key; K 31 is the encryption key shared by the home end 3 and the user end 1; N 1 is the first challenge code; F is a hash function, preferably a one-way hash function For example: A8 one-way hash function, etc. In addition, the response code is generated as shown in the following formula (8):

C =E K 23 (N 2 ,B ,K auth ) (8) C = E K 23 ( N 2 , B , K auth ) (8)

其中,C為該回應碼;E為加密函數,例如:DES或3DES等對稱式加密演算法;K23 為該訪問端2及該歸屬端3共有的共享金鑰;N2 為該第二挑戰碼或由該第二挑戰碼所產生之對應數值;B為該鑑別資料;Kauth 為該認證金鑰。此外,該國際身分碼之確認方式、該亂數碼之產生方式、該第一、第二簽署碼之產生方式、該第一、第二通訊金鑰之產生方式、該鑑別資料之組成方式、該回應碼之傳送方式與該第一實施例大致相同,在此容不贅述。Where C is the response code; E is an encryption function, such as a symmetric encryption algorithm such as DES or 3DES; K 23 is a shared key shared by the access terminal 2 and the home end 3; N 2 is the second challenge a code or a corresponding value generated by the second challenge code; B is the authentication data; K auth is the authentication key. In addition, the method for confirming the international identity code, the manner of generating the random number, the manner of generating the first and second signature codes, the manner of generating the first and second communication keys, and the manner of composition of the authentication data, The transmission mode of the response code is substantially the same as that of the first embodiment, and details are not described herein.

該通知程序S4’,包含一步驟S41’、一步驟S42’、一步驟S43’及一步驟S44’,由該訪問端2接收該回應碼,並以該共享金鑰解密該回應碼所包含之資料(例如:該第二挑戰碼或由該第二挑戰碼所產生之對應數值、該鑑別資料、該認證金鑰),以確認該回應碼所包含之資料與該訪問端2所傳送之第二挑戰碼是否相對應,例如:確認該回應碼中的第二挑戰碼與該訪問端2所傳送之第二挑戰碼是否相同,若確認無誤,則該訪問端2儲存該鑑別資料及該認證金鑰。接著,以該第一挑戰碼及該認證金鑰產生一認證碼,其中,該認證碼之產生方式為習知可以藉由金鑰進行資料加密之方式,如下式(9)所示:The notification program S4' includes a step S41', a step S42', a step S43' and a step S44'. The response terminal receives the response code, and decrypts the response code by using the shared key. Data (eg, the second challenge code or the corresponding value generated by the second challenge code, the authentication data, the authentication key) to confirm the data included in the response code and the number transmitted by the access terminal 2 Whether the second challenge code corresponds to, for example, confirming whether the second challenge code in the response code is the same as the second challenge code transmitted by the access terminal 2, and if the confirmation is correct, the access terminal 2 stores the authentication data and the authentication. Key. Then, an authentication code is generated by using the first challenge code and the authentication key, wherein the authentication code is generated by means of data encryption by a key, as shown in the following formula (9):

其中,D為該認證碼;E為加密函數,例如:DES或3DES等對稱式加密演算法;Kauth 為該認證金鑰;N1 為該第一挑戰碼。之後,再由該訪問端2將該認證碼及該亂數碼傳送至該使用端1。Where D is the authentication code; E is an encryption function, such as a symmetric encryption algorithm such as DES or 3DES; K auth is the authentication key; N 1 is the first challenge code. Then, the access code 2 and the random number are transmitted to the user terminal 1 by the access terminal 2.

該首次認證程序S5’,包含一步驟S51’、一步驟S52’、一步驟S53’、一步驟S54’及一步驟S55’,由該使用端1將該第一挑戰碼及該加密金鑰依據一雜湊函數(例如:A8單向雜湊函數等)產生該認證金鑰,並以該認證金鑰產生該認證碼,以確認該訪問端2所傳送的認證碼是否正確,並確認該第一挑戰碼與該使用端1所傳送之該第一挑戰碼相同,以此作為該使用端1認證該訪問端2之機制,接著,再由該使用端1以該加密金鑰及該亂數碼產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端2,由該訪問端2確認該第一認證簽署碼,以作為提供漫遊服務之依據,其中,該第一認證簽署碼之產生及確認方式與該第一實施例大致相同,在此容不贅述。The first authentication procedure S5' includes a step S51', a step S52', a step S53', a step S54' and a step S55'. The first challenge code and the encryption key are used by the user terminal 1 according to the A hash function (for example, an A8 one-way hash function, etc.) generates the authentication key, and generates the authentication code with the authentication key to confirm whether the authentication code transmitted by the access terminal 2 is correct, and confirms the first challenge. The code is the same as the first challenge code transmitted by the user terminal 1, as the mechanism for the user terminal 1 to authenticate the access terminal 2, and then the user terminal 1 generates the encryption key and the hash number. Transmitting a first authentication signature code to the access terminal 2, and confirming, by the access terminal 2, the first authentication signature code as a basis for providing a roaming service, wherein the first authentication signature code The manner of generation and confirmation is substantially the same as that of the first embodiment, and details are not described herein.

該再次認證程序S6’係由該使用端1進行一步驟S61’及一步驟S62’,再由該訪問端2進行一步驟S63’。由該使用端1以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端2,由該訪問端2以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該第二認證簽署碼之產生及確認方式與該第一實施例大致相同,在此容不贅述。The re-authentication program S6' performs a step S61' and a step S62' by the user terminal 1, and the access terminal 2 performs a step S63'. The user 1 performs the operation by using the encryption key and the chaotic number according to a remaining number of times, and generates a second authentication signature code, and transmits the second authentication signature code to the access terminal 2, and the access terminal 2 Calculating the second signature code according to the remaining number of times, and confirming the second authentication signature code as a basis for providing the roaming service again, wherein the second authentication signature code is generated and confirmed by the first embodiment. It is roughly the same and will not be described here.

綜上所述,本發明GSM漫遊認證方法之第二實施例可以提供一種雙向認證方法,藉由該訪問端2及該歸屬端3共同擁有該共享金鑰,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。In summary, the second embodiment of the GSM roaming authentication method of the present invention can provide a two-way authentication method, in which the access terminal 2 and the home terminal 3 jointly share the shared key, and can be in open channel and heterogeneous communication. Data transmission in the case of systems and long-distance communications, and to ensure the security of data, to avoid data interference, interception, eavesdropping or fraud.

再者,利用單向雜湊函數之向後雜湊鏈運算,當該使用端1向該訪問端2再次請求提供漫遊服務時,該訪問端2可直接產生驗證該使用端1之身分的資料,並不需要再次向該歸屬端3取得驗證身份的資料,可以降低該訪問端2的資料傳輸量,並可降低該歸屬端3的運算負荷,當該訪問端2進行資料傳輸時,可以提高資料安全性。Moreover, by using the backward hash chain operation of the one-way hash function, when the user terminal 1 requests the roaming service again to the access terminal 2, the access terminal 2 can directly generate the data for verifying the identity of the user terminal 1, and The data of the authentication identity needs to be obtained again from the home end 3, the data transmission amount of the access terminal 2 can be reduced, and the computing load of the local terminal 3 can be reduced, and the data security can be improved when the access terminal 2 performs data transmission. .

藉由前揭之技術手段,本發明所揭示之GSM漫遊認證方法方法的主要特點列舉如下:藉由該使用端1及該歸屬端3共同擁有該加密金鑰,該訪問端2及該歸屬端3共同擁有該共享金鑰,該使用端1及該歸屬端3均可產生該認證金鑰,作為資料鑑別之依據,因此,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。The main features of the GSM roaming authentication method disclosed in the present invention are as follows: The user 1 and the home end 3 jointly own the encryption key, the access terminal 2 and the home end. 3 jointly owning the shared key, the user 1 and the home 3 can generate the authentication key as a basis for data identification, and therefore, can be in an open channel, a heterogeneous communication system, and a long-distance communication. Transfer data and ensure the security of the data, to avoid data interference, interception, eavesdropping or fraud.

再者,當該使用端1向該訪問端2再次請求提供漫遊服務時,該使用端1及該訪問端2可以利用單向雜湊函數之向後雜湊鏈進行運算,該使用端1可以產生不同第二認證簽署碼,且該訪問端2可直接產生驗證該使用端1之身分的資料,並不需要再次向該歸屬端3取得驗證身份的資料,可以降低該歸屬端3及該訪問端2之間的資料傳輸量,進一步降低該歸屬端3的運算負荷及資料傳輸風險。Furthermore, when the user 1 requests the access terminal 2 to provide the roaming service again, the user terminal 1 and the access terminal 2 can perform operations using the backward hash chain of the one-way hash function, and the user terminal 1 can generate different degrees. The authentication code is signed, and the access terminal 2 can directly generate the data for verifying the identity of the user terminal 1, and does not need to obtain the data for verifying the identity again to the home terminal 3, and can reduce the home terminal 3 and the access terminal 2 The amount of data transmission between the two further reduces the computational load and data transmission risk of the home terminal 3.

雖然本發明已利用上述較佳實施例揭示,然其並非用以限定本發明,任何熟習此技藝者在不脫離本發明之精神和範圍之內,相對上述實施例進行各種更動與修改仍屬本發明所保護之技術範疇,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。While the invention has been described in connection with the preferred embodiments described above, it is not intended to limit the scope of the invention. The technical scope of the invention is protected, and therefore the scope of the invention is defined by the scope of the appended claims.

[本發明][this invention]

1...使用端1. . . Use side

2...訪問端2. . . Access side

3...歸屬端3. . . Home

S1,S1’...請求程序S1, S1’. . . Request procedure

S2,S2’...詢問程序S2, S2’. . . Inquiry procedure

S3,S3’...回應程序S3, S3’. . . Response procedure

S4,S4’...通知程序S4, S4’. . . Notifier

S5,S5’...首次認證程序S5, S5’. . . First certification procedure

S6,S6’...再次認證程序S6, S6’. . . Recertification procedure

[習知][知知]

9...習知GSM通訊系統9. . . Conventional GSM communication system

91...使用端91. . . Use side

92...訪問端92. . . Access side

93...歸屬端93. . . Home

SC...安全通道SC. . . Exit

第1圖:習知GSM架構之系統示意圖。Figure 1: Schematic diagram of the system of the conventional GSM architecture.

第2圖:本發明GSM漫遊認證方法之系統示意圖。Figure 2 is a schematic diagram of the system of the GSM roaming authentication method of the present invention.

第3圖:本發明GSM漫遊認證方法之流程圖。Figure 3 is a flow chart of the GSM roaming authentication method of the present invention.

第4圖:本發明GSM漫遊認證方法之第一實施例的資料示意圖。Figure 4 is a diagram showing the data of the first embodiment of the GSM roaming authentication method of the present invention.

第5圖:本發明GSM漫遊認證方法之第二實施例的資料示意圖。Figure 5 is a schematic diagram of the data of the second embodiment of the GSM roaming authentication method of the present invention.

1...使用端1. . . Use side

2...訪問端2. . . Access side

3...歸屬端3. . . Home

S1,S1’...請求程序S1, S1’. . . Request procedure

S2,S2’...詢問程序S2, S2’. . . Inquiry procedure

S3,S3’...回應程序S3, S3’. . . Response procedure

S4,S4’...通知程序S4, S4’. . . Notifier

S5,S5’...首次認證程序S5, S5’. . . First certification procedure

S6,S6’...再次認證程序S6, S6’. . . Recertification procedure

Claims (16)

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端將一國際身分碼傳送至一訪問端,用以向該訪問端請求提供漫遊服務;一詢問程序,係由該訪問端產生一挑戰碼,並將該挑戰碼及該國際身分碼傳送至一歸屬端;一回應程序,係由該歸屬端確認該國際身分碼,並產生一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該亂數碼、該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該挑戰碼、該鑑別資料及一共享金鑰產生一回應碼,再將該回應碼傳送至該訪問端;一通知程序,係由該訪問端以該共享金鑰確認該回應碼,並將該亂數碼傳送至該使用端;及一首次認證程序,係由該使用端以該加密金鑰及該亂數碼產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端,由該訪問端確認該第一認證簽署碼,以作為提供漫遊服務之依據;其中,當該使用端向該訪問端請求再次提供漫遊服務時,係由該使用端以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端,由該訪問端以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該剩餘次數為一運算次數與該使用端已請求提供漫遊服務之次數的差值。 A GSM roaming authentication method includes: a requesting program, wherein a user sends an international identity code to an access terminal to request a roaming service from the access terminal; and an inquiry program is generated by the access terminal a challenge code, and transmitting the challenge code and the international identity code to a home end; in a response procedure, the home end confirms the international identity code and generates a random number, waiting for the chaotic digital and an encryption gold After generating a first signing code, a second signing code, a first communication key and a second communication key, the chaotic number, the first signing code, the second signing code, and the first communication The key and the second communication key form an authentication data, and generate a response code by using the challenge code, the authentication data and a shared key, and then transmitting the response code to the access terminal; The access terminal confirms the response code by using the shared key, and transmits the random number to the user terminal; and a first authentication procedure, the user uses the encryption key and the chaotic digital to generate a first authentication signature. Code and will be the first The authentication signature code is transmitted to the access terminal, and the first authentication signature code is confirmed by the access terminal as a basis for providing the roaming service; wherein when the user terminal requests the access terminal to provide the roaming service again, the user uses the The terminal performs the operation according to the remaining number of times by using the encryption key and the chaotic digital, and generates a second authentication signature code, and transmits the second authentication signature code to the access terminal, and the second signature code is used by the access terminal. The operation is performed according to the remaining number of times, and the second authentication signing code is confirmed as a basis for providing the roaming service again, wherein the remaining number of times is a difference between the number of operations and the number of times the user has requested to provide the roaming service. 如申請專利範圍第1項所述之GSM漫遊認證方法,其中該挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。 The GSM roaming authentication method according to claim 1, wherein the challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated. 如申請專利範圍第1項所述之GSM漫遊認證方法,其中該通知程序係由該訪問端確認該回應碼中的挑戰碼與該訪問端所傳送之挑戰碼是否相對應。 The GSM roaming authentication method according to claim 1, wherein the notification procedure is that the access terminal confirms whether the challenge code in the response code corresponds to a challenge code transmitted by the access terminal. 如申請專利範圍第1項所述之GSM漫遊認證方法,其中該通知程序係由該訪問端確認該挑戰碼無誤後,儲存該鑑別資料。 The GSM roaming authentication method according to claim 1, wherein the notification program stores the authentication data after the access terminal confirms that the challenge code is correct. 一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端產生一第一挑戰碼,再將該第一挑戰碼及一國際身分碼傳送至一訪問端,用以向該訪問端請求提供漫遊服務;一詢問程序,係由該訪問端產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該國際身分碼傳送至一歸屬端;一回應程序,係由該歸屬端確認該國際身分碼,並產生一認證金鑰及一亂數碼,待由該亂數碼及一加密金鑰產生一第一簽署碼、一第二簽署碼、一第一通訊金鑰及一第二通訊金鑰後,將該第一簽署碼、該第二簽署碼、該第一通訊金鑰及該第二通訊金鑰組成一鑑別資料,並以該第二挑戰碼、該鑑別資料、該認證金鑰及一共享金鑰 產生一回應碼,再將該回應碼傳送至該訪問端;一通知程序,係由該訪問端以該共享金鑰確認該回應碼,再以該第一挑戰碼及該認證金鑰產生一認證碼,另將該認證碼及該亂數碼傳送至該使用端;及一首次認證程序,係由該使用端產生該認證金鑰,並以該認證金鑰確認該認證碼,再以該加密金鑰及該亂數碼產生一第一認證簽署碼,並將該第一認證簽署碼傳送至該訪問端,由該訪問端確認該第一認證簽署碼,以作為提供漫遊服務之依據;其中,當該使用端向該訪問端請求再次提供漫遊服務時,係由該使用端以該加密金鑰及該亂數碼依據一剩餘次數進行運算,而產生一第二認證簽署碼,並將該第二認證簽署碼傳送至該訪問端,由該訪問端以該第二簽署碼依據該剩餘次數進行運算,並確認該第二認證簽署碼,以作為再次提供漫遊服務之依據,其中,該剩餘次數為一運算次數與該使用端已請求提供漫遊服務之次數的差值。 A GSM roaming authentication method includes: a requesting process, wherein a first challenge code is generated by a user, and the first challenge code and an international identity code are transmitted to an access terminal for requesting the access terminal Providing a roaming service; an inquiry process, the second challenge code is generated by the access terminal, and the first challenge code, the second challenge code, and the international identity code are transmitted to a home end; The home end confirms the international identity code, and generates a authentication key and a random number, and a first signing code, a second signing code, a first communication key, and a first signing code are generated by the chaotic digital and an encryption key. After the second communication key, the first signing code, the second signing code, the first communication key and the second communication key form an authentication data, and the second challenge code and the authentication data are used , the authentication key and a shared key Generating a response code, and transmitting the response code to the access terminal; a notification procedure, wherein the access terminal confirms the response code with the shared key, and then generates an authentication by using the first challenge code and the authentication key a code, the authentication code and the random number are transmitted to the user end; and a first authentication procedure, the authentication key is generated by the user end, and the authentication code is confirmed by the authentication key, and the encryption code is further used The key and the random number generate a first authentication signing code, and transmit the first authentication signing code to the accessing end, and the accessing end confirms the first authentication signing code as a basis for providing roaming service; wherein, when When the user terminal requests the access terminal to provide the roaming service again, the user uses the encryption key and the chaotic digital to calculate according to a remaining number of times, and generates a second authentication signing code, and the second authentication is generated. The signature code is transmitted to the access terminal, and the access terminal performs the operation according to the remaining number of times with the second signature code, and confirms the second authentication signature code as a basis for providing the roaming service again, wherein the remaining Computing the number of times a difference between the number of times to provide roaming services to the terminal has requested use. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該第一挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。 The GSM roaming authentication method according to claim 5, wherein the first challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該第二挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。 The GSM roaming authentication method according to claim 5, wherein the second challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該通知程序係由該訪問端確認該回應碼中的第二挑 戰碼與該訪問端所傳送之第二挑戰碼是否相對應。 The GSM roaming authentication method according to claim 5, wherein the notification procedure is that the access terminal confirms the second pick in the response code. Whether the battle code corresponds to the second challenge code transmitted by the access terminal. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該歸屬端及該使用端係以該第一挑戰碼及該加密金鑰產生該認證金鑰。 The GSM roaming authentication method according to claim 5, wherein the home end and the user end generate the authentication key by using the first challenge code and the encryption key. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該歸屬端及該使用端係將該第一挑戰碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證金鑰。 The GSM roaming authentication method according to claim 5, wherein the home end and the user end operate the first challenge code and the encryption key according to a hash function to generate the authentication key. 如申請專利範圍第5項所述之GSM漫遊認證方法,其中該訪問端確認該第二挑戰碼無誤後,儲存該鑑別資料及該認證金鑰。 The GSM roaming authentication method according to claim 5, wherein the access terminal confirms that the second challenge code is correct, and stores the authentication data and the authentication key. 如申請專利範圍第1或5項所述之GSM漫遊認證方法,其中該使用端係將該亂數碼及該加密金鑰依據一第一雜湊函數進行運算,而產生該認證簽署碼。 The GSM roaming authentication method according to claim 1 or 5, wherein the user terminal operates the chaotic digital and the encryption key according to a first hash function to generate the authentication signature code. 如申請專利範圍第1或5項所述之GSM漫遊認證方法,其中該歸屬端將該亂數碼及該加密金鑰依據一第一雜湊函數及該運算次數進行運算,而產生該第一簽署碼。 The GSM roaming authentication method according to claim 1 or 5, wherein the attribution end generates the first signature code by calculating the chaotic digital and the encryption key according to a first hash function and the number of operations. . 如申請專利範圍第1或5項所述之GSM漫遊認證方法,其中該歸屬端將該亂數碼及該加密金鑰依據一第二雜湊函數及該運算次數進行運算,而產生該第一通訊金鑰。 The GSM roaming authentication method according to claim 1 or 5, wherein the home end generates the first communication gold by calculating the chaotic digital and the encryption key according to a second hash function and the number of operations. key. 如申請專利範圍第1或5項所述之GSM漫遊認證方法,其中該歸屬端係將該亂數碼及該加密金鑰依據一第一雜湊函數進行運算,而產生該第二簽署碼。 The GSM roaming authentication method according to claim 1 or 5, wherein the home end generates the second signature code by operating the chaotic digital and the encryption key according to a first hash function. 如申請專利範圍第1或5項所述之GSM漫遊認證方法,其中該歸屬端係將該亂數碼及該加密金鑰依據一第二 雜湊函數進行運算,而產生該第二通訊金鑰。 The GSM roaming authentication method according to claim 1 or 5, wherein the attribution end is based on the chaotic digital and the encryption key according to a second The hash function performs an operation to generate the second communication key.
TW101100673A 2012-01-06 2012-01-06 A gsm roaming authentication method TWI434588B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW101100673A TWI434588B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method
US13/734,235 US8855604B2 (en) 2012-01-06 2013-01-04 Roaming authentication method for a GSM system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101100673A TWI434588B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method

Publications (2)

Publication Number Publication Date
TW201330665A TW201330665A (en) 2013-07-16
TWI434588B true TWI434588B (en) 2014-04-11

Family

ID=49225927

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101100673A TWI434588B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method

Country Status (1)

Country Link
TW (1) TWI434588B (en)

Also Published As

Publication number Publication date
TW201330665A (en) 2013-07-16

Similar Documents

Publication Publication Date Title
KR102134302B1 (en) Wireless network access method and apparatus, and storage medium
US10567165B2 (en) Secure key transmission protocol without certificates or pre-shared symmetrical keys
CN102037707B (en) Secure session key generation
JP5579872B2 (en) Secure multiple UIM authentication and key exchange
CN101116284B (en) Clone resistant mutual authentication method, identity module, server and system in a radio communication network
JP5307191B2 (en) System and method for secure transaction of data between a wireless communication device and a server
CN106789042B (en) Authentication key negotiation method for user in IBC domain to access resources in PKI domain
CN1929371B (en) Method for negotiating key share between user and peripheral apparatus
US20100135491A1 (en) Authentication method
US20040151322A1 (en) Method and arrangement for efficient information network key exchange
US20050262355A1 (en) Method of providing a signing key for digitally signing verifying or encrypting data and mobile terminal
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN1977559B (en) Method and system for protecting information exchanged during communication between users
CN101969638A (en) Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN110087240B (en) Wireless network security data transmission method and system based on WPA2-PSK mode
KR100957044B1 (en) Method and system for providing mutual authentication using kerberos
CN100450305C (en) Safety service communication method based on general authentification frame
US8855604B2 (en) Roaming authentication method for a GSM system
CN106992866A (en) It is a kind of based on wireless network access methods of the NFC without certificate verification
Leu et al. Improving security level of LTE authentication and key agreement procedure
Eren Wimax security architecture-analysis and assessment
TWI455622B (en) A gsm roaming authentication method
TWI434588B (en) A gsm roaming authentication method
TWI451783B (en) A gsm roaming authentication method
Chen et al. Enhancing an AAA scheme using ID-based tickets with anonymity in future mobile communication