WO2004102874A1 - A method of implementing high speed data packet operation authentication - Google Patents

A method of implementing high speed data packet operation authentication Download PDF

Info

Publication number
WO2004102874A1
WO2004102874A1 PCT/CN2004/000495 CN2004000495W WO2004102874A1 WO 2004102874 A1 WO2004102874 A1 WO 2004102874A1 CN 2004000495 W CN2004000495 W CN 2004000495W WO 2004102874 A1 WO2004102874 A1 WO 2004102874A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
message
user terminal
ssd
eap
Prior art date
Application number
PCT/CN2004/000495
Other languages
French (fr)
Chinese (zh)
Inventor
Zhuo Li
Shikui Guo
Yang Shao
Jianghai Gao
Dianfu Chen
Zhiming Li
Weidong Wu
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2004102874A1 publication Critical patent/WO2004102874A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention relates to network authentication technology, and particularly to a method for implementing high-rate packet data service authentication. Background of the invention
  • CDMA is an advanced digital cellular mobile communication technology. It is one of the most important 3G wireless transmission technologies (RTT) accepted by the International Telecommunication Union (ITU). It has undergone IS95 since the standard was first issued by Qualcomm in 1990. , CDMA2000 lx two important stages.
  • the CDMA2000 lx network structure includes a mobile station (MS), a base transceiver station (BTS), a base station controller (BSC), a packet control function (PCF), a packet data service service point (PDSN), and service authentication. , Authorization and Accounting Server (AAA) and IS-41 core network.
  • the IS-41 core network includes a mobile switching center (MSC), a visitor location register (VLR), and a home location register (HLR).
  • MSC / VLR and HLR / Authentication Center (AuC).
  • the shared secret data (SSD) is stored in the terminal and the HLR / AuC as one of the authentication input parameters
  • A-key is stored in the terminal and the HLR / AuC, which is exclusively used to update the SSD.
  • the authentication result is calculated by the cellular authentication and voice encryption (CAVE) algorithm with parameters such as SSD, random number, electronic serial number (ESN), and mobile subscriber identification number (MIN), and is calculated by MSC / VLR or HLR / AuC compares whether the authentication results are consistent.
  • CAVE cellular authentication and voice encryption
  • the system will 'initiate an SSD update. After the SSD update is successful, that is, the SSDs on the terminal side and the network side remain consistent. The next time the user accesses, the user terminal uses the authentication results calculated by the SSD. It should be the same as the authentication result calculated in HLR / AuC. In order for authentication to succeed.
  • CDMA2000 HRPD (CDMA2000 lxEV-DO), referred to as HRPD, is an upgrade of CDMA2000 lx technology and provides high-speed packet data services.
  • the single user downlink rate is up to 2.4 Mbps.
  • the networking structure of HRPD network phase 1 includes an access terminal (AT), an access network (AN), AN AAA> PCF, and PDSN> AAA.
  • the HRPD network mainly uses AN AAA for user authentication. After the authentication is successful, ANAAA returns the terminal's International Mobile Subscriber Identity (IMSI) signal to the AT for subsequent processes such as handover and billing.
  • IMSI International Mobile Subscriber Identity
  • the BSC / PCF and AN AAA interface-A12 interface is used. This interface uses remote access dial-up user service protocol (RADIUS).
  • the authentication mechanism mainly includes password authentication protocol (PAP) and query-handshake authentication. Protocol (CHAP). Because the confidentiality of the CHAP protocol is relatively better, authentication using the CHAP protocol is more extensive.
  • CHAP uses a private key-based message digest (MD-Message Digest) identity authentication algorithm. As shown in Figure 3, taking CHAP as an example, the authentication process of RADIUS protocol is as follows:
  • Step 301 The user terminal and the network side negotiate through PPP / LCP to confirm that the CHAP protocol is used for authentication;
  • Step 302 The AN initiates authentication by sending an authentication query (Challenge) message to the user terminal, and the message includes a random number generated by the AN;
  • Step 303 The user terminal calculates the digest from the random number using the encryption algorithm specified by the CHAP protocol, and then sends the user name and the digest to the AN through a Response message.
  • Step 305 AN AAA uses the same algorithm to calculate the digest from the random number, and compares whether the digest is consistent with the one sent by the terminal. If they are consistent, the authentication is successful and AN AAA sends Access Accept message to AN, otherwise, authentication fails;
  • Step 306 The AN sends a Success message to the user terminal to notify the user terminal that the authentication is successful.
  • WLANs wireless local area networks
  • IP Internet Protocol
  • WLAN networks include many different technologies.
  • IEEE 802.11b which uses the 2.4GHz frequency band and has a maximum data transmission rate of 11Mbps.
  • IEEE 802.11g and Bluetooth technology are also used in this frequency band. Among them, the highest data transmission rate of 802.11g can reach 54Mbps.
  • Other new technologies, such as IEEE 802.11a and ETSI BRAN Hiperlan2 use the 5GHz frequency band, and the maximum transmission rate can reach 54Mbps.
  • WLAN and various wireless mobile communication networks such as: GSM, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, Time Division Duplex-Synchronous Code Division Multiple Access (TD-SCDMA) system, CDMA2000 system Interoperability is becoming the focus of current research.
  • 3GPP2 3rd Generation Partnership Project 2
  • an object of the present invention is to provide a method for implementing high-rate packet data service authentication, which is simple and convenient to maintain.
  • the authentication entity uses a user identification module-based authentication mechanism to authenticate a user terminal that has established a physical connection with the access network, and uses the user information stored in the user terminal's own user identification module as the user identity;
  • the authentication entity generates, based on the user identity, a second random number containing authentication for the user terminal and a second authentication number corresponding to the second random number calculated according to the shared secret data SSD stored on the network side;
  • the user terminal calculates according to the second random number and the SSD saved by the user terminal to obtain a first authentication number, and the authentication entity compares the first authentication number with the second authentication number. If they are the same, the authentication entity The user terminal is successfully authenticated; otherwise, the authentication fails.
  • the authentication entity is a preset authentication server or an authentication center in a wireless mobile communication system.
  • the second random number is obtained from an authentication center in the wireless mobile communication system, and the SSD is stored in a home location register HLR / AuC on the network side.
  • the second random number is obtained from the authentication server, and the SSD is stored in the HLR / AuC on the network side, or the authentication server.
  • the method further includes:
  • the authentication entity notifies the HLR on the network side of the authentication result, and the HLR judges whether the current authentication This is the first authentication. If it is the first authentication, update the SSD, and then perform step C. Otherwise, the authentication fails.
  • the method further includes:
  • the process of updating the SSD includes:
  • Dl and HLR generate SSD update random numbers, and calculate the authentication number corresponding to SSD update random numbers
  • the user terminal updates the random number according to the SSD, uses the system's original SSD generation algorithm to recalculate its own SSD, and then calculates the authentication number corresponding to the SSD update random number based on the recalculated SSD.
  • Step D1 further includes:
  • Dll and HLR send the SSD update random number (RADNSSD) and its corresponding authentication number to the authentication entity;
  • the authentication entity sends an Access-Challenge message to the access network, which carries an EAP-Request / UIM / Update message of RADNSSD;
  • Step D2 includes:
  • the user terminal After receiving the EAP-Request / UIM / Update message sent by the access network, the user terminal uses the RANDSSD to calculate a new SSD, and randomly generates a random number RANDBS, and then calculates the authentication number AUTHBS corresponding to RANDBS according to the new SSD Sending the RANDBS to the access network via an EAP-Response / UIM / Challenge message;
  • the access network sends the EAP-Response / UIM / Challenge message to the authentication entity.
  • the authentication entity obtains the base station to query the random number RANDBS and its corresponding query by interacting with the HLR. Query the authentication number AUTHBS, which is calculated according to the RANDBS and the SSD saved by itself;
  • the authenticating entity sends an Access-Challenge message to the access network, which contains the EEAAPP-RReeqquueesstt // UUIIMM // CChhaalllleennggee message carrying the authentication number AAUUTTHHBBSS; the access network receives the received After the message is sent, it will be sent to the user terminal. .
  • Step-by-step DD33 package includes:
  • the access network After the access network has received the text, it will send EEAAPP--RReessppoonnssee UUIIMM // ssuucccceessss to the authentication verification entity, which carries a carrying band The related RRAADDIIUUSS is attributed, and the authentication confirms that the entity updates the SSDSDD of the new user after receiving the message. .
  • the SSSSDD described in step DD22 is updated according to the SSSSDD described according to the SSSSDD, the number of new random machines, the serial number of the electronic and electronic substrings, and the mobile users. Calculate the identification code and password. .
  • the described steps AA include:
  • the user terminal After the user terminal receives the authentication certificate, please request it, and then read the user's user ID to identify the user's user who saved it in the identification module.
  • the user ’s personal information, and the user ’s personal information will be used as his own personal identity, and then the user ’s personal identity will be described
  • the copy of the identification mark is sent to the authentication entity by sending it through the access network. .
  • the network access mentioned above communicates with the end-user terminal of the user through the ⁇ agreement or the CCHHAAPP agreement.
  • the access network sends the request to the user terminal to send the authentication certificate to the user terminal.
  • Qiutong has realized the message through EEAAPP--RReeqquueesstt // IIddeennttiittyy;
  • Step by step AA22 includes:
  • the access network After receiving the message, the access network sends it to U-AAA through an Access-Request message, and initiates an authentication request to U-AAA.
  • Step B further includes:
  • U-AAA sends the second random number obtained by authenticating the user terminal to the user terminal through the access network.
  • the step of sending to the user terminal through the access network in step B includes:
  • the authentication entity encapsulates the second random number in an EAP-Request / UIM / Challenge message, and then sends it to the access network through an Access-Challenge message.
  • the access network After receiving the Access-Challenge message sent by the authentication entity, the access network strips the EAP-Request / UIM / Challenge from the Access-Challenge text, and sends the packet to the user terminal.
  • Step C further includes:
  • the user terminal After the user terminal calculates the first authentication number, the user terminal sends the first authentication number to the authentication entity through the access network.
  • the step of the user terminal sending the first authentication number to the authentication entity through the access network in step C includes:
  • the user terminal sends the first authentication number to the access network through an EAP-Response / UIM / Challenge message;
  • the access network encapsulates the received EAP-Response / UIM / Challeng message in an Access-Request message, and sends the encapsulated Access-Request message to the authentication entity.
  • step C the method further includes:
  • the authentication entity notifies the user terminal of the authentication success / failure through the access network.
  • the authentication entity communicates with the home location register through the ANSI-41D protocol. Letter.
  • the access network is a wireless local area network.
  • the present invention has the following advantages and characteristics:
  • the present invention uses the existing CDMAIS-41 core network to support national roaming, and does not need to set up a national dedicated network of AN AAA, which saves investment costs.
  • Unified authentication in multi-mode networks Users do not need to manually enter user names and passwords, which is convenient to use, and other network services and HRPD services can be unified account opening, unified identification, and unified authentication in HLR through IMSI, which is easy for operators to operate. .
  • HRPD users can continue to use the previous UIM cards of IS95 / CDMA2000 lx users, which will help IS95 / CDMA2000 lx users to migrate to HRPD users.
  • the user terminal can also perform authentication on the network side to implement mutual authentication between the network and the terminal, that is, network-to-terminal authentication, and terminal-to-network authentication, with high security.
  • authentication on the network side to implement mutual authentication between the network and the terminal, that is, network-to-terminal authentication, and terminal-to-network authentication, with high security.
  • Figure 1 shows the networking diagram of the IS95 / CDMA2000 lx system
  • FIG. 2 is a schematic diagram of HRPD network networking
  • FIG. 3 is a schematic flowchart of HRPD authentication in the prior art
  • FIG. 4 is a schematic diagram of a network structure for implementing the present invention.
  • FIG. 5 is a schematic flowchart of implementing the first boot-up for authentication according to the first embodiment of the present invention
  • FIG. 6 is a schematic flowchart of the specific embodiment for implementing the second-booting for authentication according to the first embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of implementing authentication for the first time in the second embodiment of the present invention
  • FIG. 8 is an example flowchart of communication between a user terminal and an access network in the present invention through a CHAP protocol.
  • the core content of the present invention is as follows:
  • the authentication entity uses a user identification module-based authentication mechanism to authenticate a user terminal that has been physically connected to the access network, and uses the user information stored in the user terminal's own user identification module to identify the user. Identification; the authentication entity generates, based on the user identity, a second random number containing authentication for the user terminal and a second authentication number corresponding to the second random number calculated based on the shared secret data stored on the network side; the user The terminal calculates according to the second random number and the shared secret data SSD saved by itself, and obtains the first authentication number. The authentication entity compares the first authentication number with the second authentication number. If the authentication number is the same, the authentication entity checks the user. The terminal authentication is successful; otherwise, the authentication fails.
  • the network accessed by the user terminal may be a WLAN network.
  • the authentication entity can be a preset authentication server or the original authentication center.
  • the authentication server and HLR can communicate through the ANSI-41D protocol.
  • the second random number can be generated by any entity on the network side, such as HLR / AuC, AAA, and so on. And the SSD is stored in the HLR / AuC on the network side, or it can be stored in the authentication server.
  • the second random number is generated by the HLR / AuC
  • the second authentication number can be directly obtained from the HLR / AuC.
  • the second random number is generated by AAA
  • the second authentication number can be obtained from the home location register / AuC according to the user identity and the first random number.
  • the AT and AN can communicate through the CHAP protocol, or the EAP protocol, or the original CDMA2000 air interface message for communication.
  • the networking structure for implementing the method of the present invention includes AT, AN, a user identification module-based authentication, authorization, and accounting server (U-AAA), PCF, PDSN, AAA, and HLR.
  • AN provides a data connection between the terminal and the packet-switched data network, which is equivalent to BTS and BSC in CDMA2000 lx, and of course also equivalent to WLAN; and
  • U-AAA is preset and is a server dedicated to authentication and accounting. .
  • the network elements used here do not need to be changed; user terminals must be HRPD terminals or hybrid terminals that support HRPD, such as: HRPD / GSM, HRPD / CDMA2000 lx, HRPD / Wireless Local Area Network (WLAN), etc.
  • the terminal hardware must support reading UIM cards or provide external card readers, support EAP-UIM protocol, support authentication through GSM HLR or CDMA HLR;
  • AN requires that the air interface and A12 interface support the EAP-UIM authentication protocol, where the air interface It is EAP-UIM over PPP, and the A12 interface is EAP-UIM over RADIUS 0 AAA can be canceled, and the accounting function is realized by the preset U-AAA.
  • the U-AAA network element replaces the AN AAA, and it is mainly required to support the IS41 protocol of CDMA and be able to support the EAP-UIM over RADIUS authentication protocol.
  • the HLR and AuC are generally physically located in the same entity, and the unified tube is hereinafter referred to as the HLR.
  • the certification process during the first startup includes three parts: first certification, SSD update, and second certification.
  • the authentication performed by the AT for the first time startup is the first authentication, and when the AT is powered on for the first time, the first authentication of the AT always fails because the SSDs stored on the system side and the AT side are inconsistent. Therefore, after the first authentication fails, an SSD update is performed, that is, the RANDSSD is issued through the EAP-REQUEST / UIM / Update message, and the new SSD is calculated through the same SSD generation algorithm through the RANDSSD, ESN, and A-key in the AT and HLR. SSD. Since the above information on the AT and HLR sides is the same and the algorithm is the same, the output SSD is also the same.
  • Step 801 An HRPD session is established between the AT and the AN, and the AT is ready to exchange data on the access stream.
  • Step 802 The AT and AN initiate PPP and LCP negotiation for access authentication.
  • Step 803 The AN initiates a Random Challenge and sends it to the AT through a CHAP Challenge message.
  • Step 804 The AT performs CAVE-based authentication and sends a CHAP Response.
  • Step 805 The AN sends an A12-Access Request message to U-AAA.
  • Step 806 The U-AAA constructs a message according to the content of the A12-Access Request message.
  • AUTHREQ message and send it to HLR / AuC.
  • Step 807 The HLR / AuC executes a CAVE-based authentication process. If the authentication passes,
  • the HLR / AuC will send an authentication response return result (authreq) message to the U-AAA, and it contains
  • Step 808 The U-AAA stores the SSD allocated by the HLR / AuC.
  • Step 809 The U-AAA sends an A12-Access Accept message to the AN.
  • Step 810 The AN returns a CHAP authentication success message (CHAP Authentication) to the AT.
  • CHAP authentication success message CHAP Authentication
  • Step 811 The AT and AN then perform subsequent processing.
  • Step 501 A physical connection is established between the WLAN MS and the WLAN.
  • Step 502 The WLAN MS initiates an authentication request to the WLAN, that is, the WLAN MS sends an EAPoL-Start message to the network.
  • Step 503 The WLAN sends a request for a username (EAP-Request / Identity) message to the WLAN MS, starts authentication, and requests the WLAN MS to send the user identity.
  • Step 504 After receiving the EAP-Request / Identity message, the WLAN MS reads out the information stored in the UIM card through the corresponding interface as its own user identity, and responds to the user name (EAP-Response / Identity). The text is sent to the WLAN.
  • Step 505 After receiving the EAP-Response / Identity message, the WLAN initiates an authentication request to the U-AAA through an Access-Request message in the Radius protocol, and the EAP-Response / Identity message.
  • Step 506 After receiving the Access-Request message sent by the WLAN, the U-AAA takes out the user identity carried in the U-AAA, and then judges the type of the user identity according to its related configuration information. If it is a UIM type, it is accessing A query (Access-Challenge) message is encapsulated in an EAP-UIM authentication start (EAP-Request / UIM / Start) message, and then sent to the WLAN; otherwise, it is not processed.
  • EAP-UIM authentication start EAP-Request / UIM / Start
  • Step 507 After receiving the Access-Challenge message, the WLAN strips the EAP-Request / UIM / Start message, and then sends the stripped message to the WLAN MS.
  • Step 508 After the WLAN MS receives the EAP-Request / UIM / Start message sent by the WLAN, the WLAN MS includes a random number Nonce_MT generated by itself, and includes it in the attribute AT_NONCE_MT, and then sends to the WLAN The random number of the EAP-Response / UIM / Start message indicates that the EAP-UIM authentication protocol is agreed to be used.
  • Step 509 After receiving the EAP-Response / UIM / Start message from the WLAN MS, the WLAN encapsulates the EAP-Response / UIM / Start message in an Access-Request message, and then sends the Access-Request message to U-AAA. .
  • Step 510 After receiving the Access-Request message sent by the LAN, the U-AAA determines to adopt a unique query method, that is, the U-AAA generates a random number (RANDU) -the second random number for authenticating the WLAN MS, and according to itself, The saved SSD calculates the second authentication number (AUTHU2) corresponding to the random number, thereby forming an authentication set.
  • RANDU random number
  • AUTHU2 the second authentication number
  • Step 511 U-AAA encapsulates RANDU in EAP-Request / UIM / Challenge
  • the RANDU and MAC are then sent to the LAN through the Access-Challenge message; here, the MAC is generated by U-AAA according to the received random number Nonce_MT and the EAP-Request message to be issued.
  • Step 512 After the WLAN receives the Access-Challenge message sent by the U-AAA, it strips the EAP-Request UIM / Challenge from the Access-Challenge message, and sends the stripped message to the WLAN MS.
  • Step 513 When the WLAN MS receives the EAP-Request / UIM / Challenge message, it first verifies that the MAC in the received EAP message is correct. If it is wrong, the WLAN MS sends an error message to the network and terminates the process. Otherwise, the RANDU and WLAN MS are taken out, and the first authentication number (AUTHU1) is calculated according to the RANDU and the ESN, SSD, and MIN obtained from the UIM.
  • AUTHU1 the first authentication number
  • Step 514 The WLAN MS AUTHU1 ESN, MIN, and the recalculated MAC are sent to the WLAN through an EAP-Response / UIM / Challenge message.
  • Step 515 The WLAN encapsulates the received EAP-Response UIM / Challeng message in an access request (Access-Request) message of the Radius protocol, and sends the encapsulated Access-Request message to U-AAA.
  • Access-Request access request
  • Step 516 After receiving the Access-Request packet sent by the WLAN, U-AAA parses AUTHU1 and judges whether AUTHU1 is consistent with AUTHU2 calculated by itself. If they are consistent, U-AAA passes the WLAN MS authentication. Otherwise, the authentication process fails.
  • Step 517 U-AAA sends an Access-Accept message containing the EAP-Success message to the WLAN network side (authentication is successful); or U-AAA sends an Access-Reject 4 message containing the EAP-Failure 4 message to the WLAN ( Authentication failed).
  • Step 518 After the WLAN receives the Access-Accept message sent by the U-AAA, it strips out the EAP-Success message and sends the EAP-Success message to the WLAN. The MS notifies the WLAN MS that the authentication is successful. If the Access-Reject message is received, the EAP-Failure message is stripped out, and each WLAN MS is sent to notify the WLAN MS of the authentication failure.
  • Steps 601 to 615 are the same as steps 501-515 in FIG. 5.
  • Steps 616 to 617 The U-AAA device compares AUTHU1 with AUTHU1 stored in the local machine. If they are the same, it means that the client is authenticated and sends an EAP-Success message to the WLAN MS via WLAN. Otherwise, it responds to the HLR with authentication failure. After receiving the response from the HLR, the HLR randomly generates two random numbers, RANDSSD and RANDU, and calculates the corresponding AUTHU according to the RANDU, and then sends the ANDSSD RANDU / AUTHU to U-AAA to start the process of updating the SSD.
  • Step 618 U-AAA sends an Access-Challenge message to the WLAN, which contains an EAP-Request / UIM / Update message carrying a RADNSSD random number.
  • Step 619 The WLAN sends an EAP-Request UIM / Update message to the WLAN.
  • Step 621 The WLAN sends the EAP-Response / UIM / Challenge to the authentication server U-AAA in the EAP Over RADIUS message format.
  • Step 622 After receiving the EAP-Response / UIM / Challenge, the U-AAA passes and The HLR interacts to obtain the base station query random number (RANDBS) and its corresponding query authentication result (AUTHBS).
  • RANDBS base station query random number
  • AUTHBS query authentication result
  • the HLR randomly generates RANDBS, and calculates AUTHBS according to the random number and the SSD saved by itself.
  • Step 623 The U-AAA sends an Access-Challenge message to the WLAN, which contains an EAP-Request UIM / Challenge message carrying the AUTHBS authentication number.
  • Step 624 After receiving the EAP-Request / UIM / Challenge message, the WLAN sends the message to the WLAN MS.
  • Step 625 After receiving the EAP-Request / UTM / Challenge message sent by the WLAN, the WLAN MS parses out the AUTHBS in the EAP-Request / UTM / Challenge message, and then compares whether the parsed AUTHBS is consistent with the AUTHBS calculated by the WLAN MS. The AAA authentication is passed, and then an EAP-Response / UIM / success message is sent to the WLAN.
  • Step 626 After receiving the message, the WLAN sends the EAP-Response UIM / success to the authentication server U-AAA in the format of an Access-Request message with the relevant RADIUS attributes, indicating that the SSD update process is over.
  • Step 627 After receiving the Access-Request message sent by the WLAN, U-AAA determines the unique query method based on the RANDU and AUTHU received from the HLR in step 616; Steps 628-Step 635 are the same as 511 in FIG. 5 ⁇ Step 518.
  • step 632 the U-AAA simultaneously notifies the HLR / AuC to update the SSD stored in the AuC, and the AuC updates the local SSD according to the received notification message.
  • Step 701 A physical connection is established between the WLAN MS and the WLAN.
  • Step 702 the WLAN MS requests authentication from the network, that is, the WLAN MS requests the network Send an EAPoL-Start message.
  • Step 703 The WLAN sends a request username (EAP-Request / Identity) message to the WLAN MS to start authentication, and requests the WLAN MS to send the user identity.
  • EAP-Request / Identity a request username (EAP-Request / Identity) message
  • Step 704 After receiving the EAP-Request / Identity message, the WLAN MS reads out the information stored in the UIM card through the corresponding interface as its own user identity, and responds to the user name (EAP-Response / Identity). 4 The text is sent to the WLAN.
  • Step 705 After receiving the EAP-Response Identity message, the WLAN initiates an authentication request to the U-AAA through an Access-Request message in the Radius protocol, and the message encapsulates an EAP-Response / Identity message.
  • Step 706 After receiving the Access-Request message sent by the WLAN, the U-AAA extracts the user ID carried in the Access-Request packet, and then judges the type of the user ID according to its related configuration information. If it is a UIM type, it queries the access.
  • the (Access-Challenge) message encapsulates a request for EAP-UIM authentication start (EAP-Request UIM / Start) message, and then sends it to the WLAN, otherwise, it is not processed.
  • Step 707 After receiving the Access-Challenge message, the WLAN strips out the EAP-Request / UIM / Start message, and then sends the stripped message to the WLAN MS.
  • Step 709 After receiving the EAP-Response UIM / Start message from the WLAN MS, the WLAN encapsulates the EAP-Response / UIM / Start message in an Access-Request message, and then sends the Access-Request message to U-AAA.
  • Step 710 After receiving the Access-Request message sent by the WLAN, the U-AAA determines that the global authentication method is adopted, that is, the U-AAA generates an authentication method for the WLAN MS.
  • Random number (RAND) a second random number
  • AUTHR2 a second authentication number
  • MAC Corresponding message authentication code
  • Step 711 U-AAA encapsulates the RAND and MAC in the EAP-Request / UIM / Challenge message, and then sends it to the WLAN through the Access-Challenge message.
  • Step 712 After the WLAN receives the Access-Challenge message sent by the U-AAA, it strips out the EAP-Request / UIM / Challenge from the Access-Challenge message, and sends the stripped message to the WLAN MS.
  • Step 713 After the WLAN MS receives the EAP-Request / UIM / Challenge message, it takes out the RAND in it, and the WLAN MS calculates the first authentication number (AUTHR1) according to the RAND and the password read from the UIM card.
  • AUTHR1 the first authentication number
  • Step 714 1 ⁇ ] ⁇ 48 sends 811113 ⁇ 41, £ 8> 1,] ⁇ 1 ⁇ ] ⁇ ⁇ , and RANDC to the WLAN through the EAP-Response UIM / Challenge message.
  • the RA DC is derived by the WLAN MS according to the received RAND.
  • Step 715 The WLAN encapsulates the received EAP-Response / UIM / Challeng message in an Radius protocol Access-Request message, and sends the encapsulated Access-Request message to U-AAA. .
  • Step 716 After receiving the Access-Request message sent by the WLAN, the U-AAA determines the corresponding RAND according to the RANDC in the U-AAA; then the U-AAA judges whether the user's SSD has been obtained, and if so, parses out the AUTHR1 among them. Whether AUTHR1 is consistent with the AUTHR2 of the user terminal stored by itself. If they are the same, the U-AAA authentication of the WLAN MS is passed; otherwise, the authentication process fails.
  • Step 717 U-AAA sends an Authentication Success (Access-Accept) message to the WLAN containing the EAP-Success and MAC values; or U-AAA sends EAP-Failure message and MAC-value authentication failure (Access-Reject) message.
  • Access-Accept Authentication Success
  • MAC-value authentication failure Access-Reject
  • Step 718 After the WLAN receives the Access-Accept message sent by the U-AAA, it strips out the EAP-Success message and sends the EAP-Success message to the WLAN MS to notify the WLAN MS that the authentication is successful. After the Access-Reject message, the EAP-Failure message is stripped out, and each WLAN MS is sent to notify the WLAN MS of the authentication failure. When the WLAN MS first checks the MAC, it only confirms that the EAP-request message is correct when the received MAC value matches the locally calculated MAC.
  • the first embodiment is a unique query process
  • the second embodiment is a global authentication process.
  • the two processes are basically the same, except that when the U-AAA authenticates the WLAN MS, the types of random numbers generated are different, and WLAN MS and U-AAA are different.
  • the parameters carried in the authentication message vary from time to time.
  • the WLAN MS uses the CAVE algorithm and uses RANDU, A-key, MIN, and ESN as input parameters to generate AUTHU; for global authentication, when U-AAA sends the generated RAND to the WLAN MS, the WLAN MS generates the AUTHR by using the CAVE algorithm with RAND, A-key, MIN, and ESN as input parameters.
  • the LAN MS sends the parameter to U-AAA after calculating AUTHU; for global authentication, the WLAN MS sends U-AAA to U-AAA after calculating AUTHR Send this parameter and send RANDC parameter to U-AAA at the same time, this parameter is derived according to RAND.
  • the WLAN MS After calculating the AUTHU or AUTHR, the WLAN MS sends a response message to the U-AAA.
  • the response message includes the electronic serial number (ESN) and mobile subscriber identification number (MIN) of the WLAN MS.
  • the WLAN MS After receiving the UIM authentication start message (EAP-request / UIM / Start) sent by U-AAA, the WLAN MS internally generates a random number
  • AT—NONCE—MT sends the random number to U-AAA through the message EAP-response / UIM / Start as the terminal-to-network authentication parameter.
  • U-AAA After U-AAA receives the AT_NONCE_MT sent by the WLAN MS, it calculates the response MAC through an algorithm, and sends the MAC to the WLAN MS through a subsequent EAP-request message.
  • the WLAN MS first checks the MAC. Only when the received MAC parameters match the locally calculated MACs, it is confirmed that the EAP-request message is correct.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method of implementing high speed data packet operation authentication, the method includes: user terminal establishing physical connection with access network takes user information saved in user identify module as user identity, starts to authenticate with the authentication entity based on the user identify module; according to said user identity, authentication entity gets the second random data and the second authentication value related to the second random data computed by share secret data; said user terminal computes the first authentication value based on the second random data and share secret data saved itself, authentication entity compares the first authentication value with the second authentication value, if equal, the authentication is succeed, if not equal, the authentication is failing. The method is that authentication is security, cost is lower, operation is conveniency.

Description

一种实现高速率分组数据业务认证的方法 技术领域  Method for implementing high-rate packet data service authentication
本发明涉及网络的鉴权技术, 特别是指一种实现高速率分组数据业 务认证的方法。 发明背景  The present invention relates to network authentication technology, and particularly to a method for implementing high-rate packet data service authentication. Background of the invention
CDMA是一种先进的数字蜂窝移动通信技术, 是国际电联(ITU) 接受的最重要的 3G无线传输技术(RTT)之一, 自 1990年由美国高通 公司首次发布标准以来, 已经历了 IS95、 CDMA2000 lx两个重要阶段。  CDMA is an advanced digital cellular mobile communication technology. It is one of the most important 3G wireless transmission technologies (RTT) accepted by the International Telecommunication Union (ITU). It has undergone IS95 since the standard was first issued by Qualcomm in 1990. , CDMA2000 lx two important stages.
如图 1所示, CDMA2000 lx网络结构包括移动台(MS)、 基站收发 信机(BTS)、 基站控制器(BSC)、 分组控制功能(PCF)、 分组数据业 务服务接点 (PDSN)、 业务认证、 授权和计费服务器(AAA)和 IS-41 核心网。 其中, IS-41核心网包括移动交换中心 (MSC)、 访问位置寄存 器 (VLR)、 归属位置寄存器 (HLR)。  As shown in Figure 1, the CDMA2000 lx network structure includes a mobile station (MS), a base transceiver station (BTS), a base station controller (BSC), a packet control function (PCF), a packet data service service point (PDSN), and service authentication. , Authorization and Accounting Server (AAA) and IS-41 core network. Among them, the IS-41 core network includes a mobile switching center (MSC), a visitor location register (VLR), and a home location register (HLR).
CDMA IS95和 CDMA 20001 x网络中的用户认证 ,是通过 MSC/VLR 和 HLR/鉴权中心(AuC)共同完成。 并且, 共享秘密数据 (SSD)作为 认证输入参数之一保存在终端和 HLR/AuC中,在终端和 HLR/AuC中保 存相同的密码(A-key), 专用于更新 SSD。 当需要认证时, 以 SSD、 随 机数、 电子串号(ESN)、 移动用户识别号(MIN)等参数通过蜂窝认证 和语音加密( CAVE )算法计算出认证结果,并由 MSC/VLR或 HLR/AuC 比较认证结果是否一致, 如果不一致, 系统将'会发起 SSD更新, 在 SSD 更新成功之后, 即终端侧和网络侧的 SSD保持一致, 下次接入时, 用户 终端利用 SSD计算出的认证结果应与 HLR/AuC中计算来的认证结果一 致, 认证才能成功。 User authentication in CDMA IS95 and CDMA 20001 x networks is done jointly by MSC / VLR and HLR / Authentication Center (AuC). In addition, the shared secret data (SSD) is stored in the terminal and the HLR / AuC as one of the authentication input parameters, and the same password (A-key) is stored in the terminal and the HLR / AuC, which is exclusively used to update the SSD. When authentication is required, the authentication result is calculated by the cellular authentication and voice encryption (CAVE) algorithm with parameters such as SSD, random number, electronic serial number (ESN), and mobile subscriber identification number (MIN), and is calculated by MSC / VLR or HLR / AuC compares whether the authentication results are consistent. If they are not the same, the system will 'initiate an SSD update. After the SSD update is successful, that is, the SSDs on the terminal side and the network side remain consistent. The next time the user accesses, the user terminal uses the authentication results calculated by the SSD. It should be the same as the authentication result calculated in HLR / AuC. In order for authentication to succeed.
CDMA2000 HRPD ( CDMA2000 lxEV-DO ), 简称 HRPD , 是 CDMA2000 lx技术的升级, 提供高速分组数据业务, 单用户下行最高 速率达 2.4 Mbps。  CDMA2000 HRPD (CDMA2000 lxEV-DO), referred to as HRPD, is an upgrade of CDMA2000 lx technology and provides high-speed packet data services. The single user downlink rate is up to 2.4 Mbps.
如图 2所示, HRPD网络阶段 1的组网结构包括接入终端 (AT )、 接入网络(AN )、 AN AAA > PCF、 PDSN> AAA。 HRPD网络主要是利 用 AN AAA进行用户认证。 在认证成功后, ANAAA向 AT返回该终端 的国际移动用户识别 (IMSI )信号, 用于之后进行切换、 计费等过程。 在 HRPD认证过程中 , 使用 BSC/PCF与 AN AAA的接口一 A12接口, 该接口使用远端接入拨号用户服务协议(RADIUS ), 其认证机制主要有 口令认证协议( PAP )和查询-握手认证协议( CHAP ), 由于 CHAP协议 的保密性相对好一些, 所以使用 CHAP协议进行认证更加广泛。  As shown in FIG. 2, the networking structure of HRPD network phase 1 includes an access terminal (AT), an access network (AN), AN AAA> PCF, and PDSN> AAA. The HRPD network mainly uses AN AAA for user authentication. After the authentication is successful, ANAAA returns the terminal's International Mobile Subscriber Identity (IMSI) signal to the AT for subsequent processes such as handover and billing. In the HRPD authentication process, the BSC / PCF and AN AAA interface-A12 interface is used. This interface uses remote access dial-up user service protocol (RADIUS). The authentication mechanism mainly includes password authentication protocol (PAP) and query-handshake authentication. Protocol (CHAP). Because the confidentiality of the CHAP protocol is relatively better, authentication using the CHAP protocol is more extensive.
CHAP釆用了基于私有密钥的消息摘要( MD-Message Digest )身份 认证算法。 参见图 3所示, 以 CHAP协议为例, RADIUS协议进行认证 的过程具体如下:  CHAP uses a private key-based message digest (MD-Message Digest) identity authentication algorithm. As shown in Figure 3, taking CHAP as an example, the authentication process of RADIUS protocol is as follows:
步骤 301 : 用户终端与网络侧通过 PPP/LCP协商, 确认使用 CHAP 协议进行认证;  Step 301: The user terminal and the network side negotiate through PPP / LCP to confirm that the CHAP protocol is used for authentication;
步骤 302: AN通过向用户终端发出认证查询(Challenge )消息, 从 而发起认证, 该消息中包含有 AN产生的随机数;  Step 302: The AN initiates authentication by sending an authentication query (Challenge) message to the user terminal, and the message includes a random number generated by the AN;
步骤 303: 用户终端通过 CHAP协议规定的加密算法由随机数计算 出摘要, 然后通过回应 (Response ) 消息将用户名和摘要发送给 AN; 步骤 304: AN在 A12接口用 RADIUS 协议的接入请求(Access Request ) 消息承载用户名、 随机数和摘要发送给 AN AAA;  Step 303: The user terminal calculates the digest from the random number using the encryption algorithm specified by the CHAP protocol, and then sends the user name and the digest to the AN through a Response message. Step 304: The AN uses the RADIUS protocol access request (Access on the A12 interface). Request) message carrying username, random number and digest to AN AAA;
步骤 305: AN AAA用同样的算法由随机数计算出摘要, 比较这个 摘要与终端发送上来的是否一致, 若一致, 则认证成功, AN AAA发送 Access Accept消息给 AN, 否则, 认证失败; Step 305: AN AAA uses the same algorithm to calculate the digest from the random number, and compares whether the digest is consistent with the one sent by the terminal. If they are consistent, the authentication is successful and AN AAA sends Access Accept message to AN, otherwise, authentication fails;
步骤 306: AN发送 Success消息给用户终端, 通知用户终端认证成 功。  Step 306: The AN sends a Success message to the user terminal to notify the user terminal that the authentication is successful.
从上面过程可以看出, 现有技术对 HRPD网络用户进行认证时, 需 要使用 AN AAA, 并且其认证过程为网络对用户的单向方式。  It can be seen from the above process that, in the prior art, when an HRPD network user is authenticated, AN AAA needs to be used, and the authentication process is a one-way method of network to user.
目前, 随着市场经济以及科学技术的发展, 越来越多的运营商需要 同时经营多种网络。 比如, 具有 IS95/CDMA2000 lx网络的运营商还想 继续将自己的业务扩展到 CDMA2000 lxDO 网络, 而在 CDMA2000 lxDO网络中, 要建立专门的 AN AAA进行认证。 这种认证方式, 对于 多模终端的用户来说, 需要在 HLR和 AN AAA两个地方开户, 认证方 式不统一,维护不方便,不利于统一运营; 而且,还需要再组建 AN AAA 的全国专用网络进行 HRPD用户认证, 建网成本高; 由于认证方式为网 络对用户的单项认证, 所以认证不安全。  Currently, with the development of market economy and science and technology, more and more operators need to operate multiple networks at the same time. For example, operators with IS95 / CDMA2000 lx networks also want to continue to expand their services to CDMA2000 lxDO networks, and in CDMA2000 lxDO networks, special AN AAAs must be established for authentication. This authentication method requires users of multi-mode terminals to open accounts in two places, HLR and AN AAA. The authentication methods are not unified, maintenance is not convenient, and it is not conducive to unified operation. In addition, a national special AN AAA needs to be established HRPD user authentication is performed on the network, and the network construction cost is high. Since the authentication method is a single authentication of the user to the network, the authentication is not secure.
另外, 无线局域网 ( WLAN , Wireless Local Area Network )作为一 种高速的无线数据接入技术受到越来越多的关注。 WLAN网络主要用于 传输因特网协议(IP )分组数据包, 即通过接入点(AP )完成用户终端 的无线接入, 然后通过网络控制器和连接设备完成 IP包的传输。 WLAN 网络包括多种不同技术, 目前应用较为广泛的一个技术标准是 IEEE 802.11b, 它采用 2.4GHz频段, 最高数据传输速率可达 11Mbps, 使用该 频段的还有 IEEE 802.11g和蓝牙 (Bluetooth )技术, 其中, 802.11g最 高数据传输速率可达 54Mbps。 其它新技术, 诸如 IEEE 802.11a和 ETSI BRAN Hiperlan2都使用 5GHz频段, 最高传输速率也可达到 54Mbps。  In addition, wireless local area networks (WLANs), as a high-speed wireless data access technology, have received increasing attention. The WLAN network is mainly used for transmitting Internet Protocol (IP) packet data packets, that is, wireless access of a user terminal is completed through an access point (AP), and then IP packet transmission is completed through a network controller and a connecting device. WLAN networks include many different technologies. One of the more widely used technical standards is IEEE 802.11b, which uses the 2.4GHz frequency band and has a maximum data transmission rate of 11Mbps. IEEE 802.11g and Bluetooth technology are also used in this frequency band. Among them, the highest data transmission rate of 802.11g can reach 54Mbps. Other new technologies, such as IEEE 802.11a and ETSI BRAN Hiperlan2, use the 5GHz frequency band, and the maximum transmission rate can reach 54Mbps.
随着 WLAN技术的兴起和发展, WLAN与各种无线移动通信网, 诸如: GSM、 码分多址(CDMA ) 系统、 宽带码分多址(WCDMA ) 系 统、 时分双工-同步码分多址(TD-SCDMA ) 系^、 CDMA2000 系统的 互通正成为当前研究的重点。 在笫三代合作伙伴计划 2 ( 3GPP2 )标准 化组织中, 目前正在进行 WLAN用户接入 3GPP2网络的工作。 发明内容 With the rise and development of WLAN technology, WLAN and various wireless mobile communication networks, such as: GSM, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, Time Division Duplex-Synchronous Code Division Multiple Access (TD-SCDMA) system, CDMA2000 system Interoperability is becoming the focus of current research. In the 3rd Generation Partnership Project 2 (3GPP2) standardization organization, the work of WLAN users accessing the 3GPP2 network is currently underway. Summary of the invention
有鉴于此, 本发明的目的是提供一种实现高速率分组数据业务认证 的方法, 使其简单, 维护方便。  In view of this, an object of the present invention is to provide a method for implementing high-rate packet data service authentication, which is simple and convenient to maintain.
A. 认证实体采用基于用户标识模块认证机制对与接入网已建立物 理连接的用户终端进行认证, 并将该用户终端自身用户标识模块中保存 的用户信息作为用户身份标识;  A. The authentication entity uses a user identification module-based authentication mechanism to authenticate a user terminal that has established a physical connection with the access network, and uses the user information stored in the user terminal's own user identification module as the user identity;
B. 认证实体根据所述用户身份标识, 产生含有对该用户终端进行 认证的第二随机数以及根据网络侧保存的共享秘密数据 SSD计算出的 第二随机数所对应的第二鉴权数;  B. The authentication entity generates, based on the user identity, a second random number containing authentication for the user terminal and a second authentication number corresponding to the second random number calculated according to the shared secret data SSD stored on the network side;
C. 所述用户终端根据第二随机数和自身保存的 SSD进行计算, 得 出第一鉴权数, 认证实体将第一鉴权数与第二鉴权数进行比较, 如果相 同, 则认证实体对用户终端认证成功, 否则, 认证失败。  C. The user terminal calculates according to the second random number and the SSD saved by the user terminal to obtain a first authentication number, and the authentication entity compares the first authentication number with the second authentication number. If they are the same, the authentication entity The user terminal is successfully authenticated; otherwise, the authentication fails.
所述认证实体为预先设置的认证服务器, 或无线移动通信系统中的 鉴权中心。  The authentication entity is a preset authentication server or an authentication center in a wireless mobile communication system.
当认证实体为无线移动通信系统中的鉴权中心时, 所述第二随机数 是从无线移动通信系统中的鉴权中心获取,并且所述 SSD保存在网络侧 的归属位置寄存器 HLR/AuC。  When the authentication entity is an authentication center in a wireless mobile communication system, the second random number is obtained from an authentication center in the wireless mobile communication system, and the SSD is stored in a home location register HLR / AuC on the network side.
当认证实体为预先设置的认证服务器时, 所述第二随机数是从该认 证服务器中获取, 并且所述 SSD保存在网络侧的 HLR/AuC, 或该认证 服务器中。  When the authentication entity is a preset authentication server, the second random number is obtained from the authentication server, and the SSD is stored in the HLR / AuC on the network side, or the authentication server.
在步骤 C认证失败后, 进一步包括:  After the authentication fails in step C, the method further includes:
认证实体将认证结果通知网络侧的 HLR, HLR判断本次认证是否 是首次认证, 如果是首次认证, 则更新 SSD, 然后执行步骤 C, 否则, 认证失败。 The authentication entity notifies the HLR on the network side of the authentication result, and the HLR judges whether the current authentication This is the first authentication. If it is the first authentication, update the SSD, and then perform step C. Otherwise, the authentication fails.
在步驟 C认证失败后, 进一步包括:  After the authentication fails in step C, the method further includes:
更新 SSD, 然后再执行步骤。。  Update the SSD before performing the steps. .
更新 SSD的过程包括:  The process of updating the SSD includes:
Dl、 HLR产生 SSD更新随机数, 并且计算出 SSD更新随机数对应 的鉴权数;  Dl and HLR generate SSD update random numbers, and calculate the authentication number corresponding to SSD update random numbers;
D2、 用户终端根据所述 SSD更新随机数, 利用系统原 SSD生成算 法重新计算自身的 SSD, 然后再根据重新计算出的该 SSD计算出 SSD 更新随机数对应的鉴权数;  D2. The user terminal updates the random number according to the SSD, uses the system's original SSD generation algorithm to recalculate its own SSD, and then calculates the authentication number corresponding to the SSD update random number based on the recalculated SSD.
D3、 比较用户终端计算出的鉴权数与 HLR中计算出的鉴权数是否 一致, 如果一致, 则更新用户终端侧的 SSD, 否则, SSD更新失败。  D3. Compare whether the authentication number calculated by the user terminal is consistent with the authentication number calculated in the HLR. If they are the same, update the SSD on the user terminal side; otherwise, the SSD update fails.
步骤 D1进一步包括:  Step D1 further includes:
Dll、 HLR将 SSD更新随机数 ( RADNSSD )及其对应的鉴权数发 送至认证实体;  Dll and HLR send the SSD update random number (RADNSSD) and its corresponding authentication number to the authentication entity;
D12、 认证实体向接入网发送 Access-Challenge 报文, 其中携带 RADNSSD的 EAP-Request/UIM/Update报文;  D12. The authentication entity sends an Access-Challenge message to the access network, which carries an EAP-Request / UIM / Update message of RADNSSD;
D13、 接入网将 EAP-Request/UIM/Update 艮文发送至用户终端。 步骤 D2包括:  D13. The access network sends the EAP-Request / UIM / Update text to the user terminal. Step D2 includes:
D21、用户终端收到接入网发送的 EAP-Request/UIM/Update报文后 , 利用 RANDSSD计算得出新 SSD, 并随机产生随机数 RANDBS, 再根 据新 SSD计算出 RANDBS对应的鉴权数 AUTHBS, 再将 RANDBS通 过 EAP-Response/UIM/Challenge报文发送至接入网;  D21. After receiving the EAP-Request / UIM / Update message sent by the access network, the user terminal uses the RANDSSD to calculate a new SSD, and randomly generates a random number RANDBS, and then calculates the authentication number AUTHBS corresponding to RANDBS according to the new SSD Sending the RANDBS to the access network via an EAP-Response / UIM / Challenge message;
D22、接入网将 EAP-Response/UIM/Challenge消息发送给认证实体; 认证实体通过与 HLR交互获得基站查询随机数 RANDBS及其对应的查 询鉴权数 AUTHBS,所述 AUTHBS是根据 RANDBS和自身保存的 SSD 进行计算得出; D22. The access network sends the EAP-Response / UIM / Challenge message to the authentication entity. The authentication entity obtains the base station to query the random number RANDBS and its corresponding query by interacting with the HLR. Query the authentication number AUTHBS, which is calculated according to the RANDBS and the SSD saved by itself;
D23、认证实体向接入网发送 Access-Challenge报文,其中携带鉴权 数数 AAUUTTHHBBSS的的 EEAAPP--RReeqquueesstt//UUIIMM//CChhaalllleennggee报报文文;;接接入入网网收收到到该该报报文文后后,, 将将其其发发送送至至用用户户终终端端。。  D23. The authenticating entity sends an Access-Challenge message to the access network, which contains the EEAAPP-RReeqquueesstt // UUIIMM // CChhaalllleennggee message carrying the authentication number AAUUTTHHBBSS; the access network receives the received After the message is sent, it will be sent to the user terminal. .
步步骤骤 DD33包包括括::  Step-by-step DD33 package includes:
DD3311、、 用用户户终终端端接接收收到到 EEAAPP--RReeqquueesstt//UUIIMM//CChhaalllleennggee报报文文后后,, 比比较较其其 中中的的 AAUUTTHHBBSS与与自自身身计计算算出出的的 AAUUTTHHBBSS是是否否一一致致,, 如如果果一一致致,, 更更新新用用 户户终终端端侧侧的的 SSSSDD ,, 用用户户终终端端对对认认证证实实体体认认证证通通过过,, 并并发发送送 EEAAPP--RReessppoonnssee//UUIIMM//ssuucccceessss才才艮艮文文至至接接入入网网;;  DD3311, After receiving the EEAAPP--RReeqquueesstt // UUIIMM // CChhaalllleennggee message by terminating with the user's terminal, compare and calculate the AAUUTTHHBBSS among them and calculate with yourself Is the AAUUTTHHBBSS consistent? If it is consistent, update the SSDSSDD on the side of the end-user terminal of the new user, and verify the entity with the pair-end authentication of the user-end terminal. Pass the authentication certificate and send it to EEAAPP--RReessppoonnssee // UUIIMM // ssuucccceessss in parallel and send it to the access network;
DD3322、、 接接入入网网收收到到该该艮艮文文后后,, 将将 EEAAPP--RReessppoonnssee UUIIMM//ssuucccceessss发发送送给给 认认证证实实体体,, 其其中中携携带带相相关关的的 RRAADDIIUUSS的的属属性性,, 认认证证实实体体收收到到该该报报文文后后,, 更更新新用用户户的的 SSSSDD。。  DD3322, After the access network has received the text, it will send EEAAPP--RReessppoonnssee UUIIMM // ssuucccceessss to the authentication verification entity, which carries a carrying band The related RRAADDIIUUSS is attributed, and the authentication confirms that the entity updates the SSDSDD of the new user after receiving the message. .
步步驟驟 DD22中中所所述述自自身身的的 SSSSDD是是根根据据所所述述 SSSSDD更更新新随随机机数数、、电电子子串串号号、、 移移动动用用户户标标识识、、 密密码码计计算算。。  The SSSSDD described in step DD22 is updated according to the SSSSDD described according to the SSSSDD, the number of new random machines, the serial number of the electronic and electronic substrings, and the mobile users. Calculate the identification code and password. .
所所述述步步驟驟 AA包包括括::  The described steps AA include:
AAll、、 接接入入网网向向用用户户终终端端发发出出认认证证请请求求;;  AAll ,, and access network to send a certificate of authentication to the user terminal;
ΑΑ22、、''用用户户终终端端收收到到该该认认证证请请求求后后,, 读读取取用用户户标标识识模模块块中中保保存存的的用用户户 信信息息,, 并并将将该该用用户户信信息息作作为为自自己己的的用用户户身身份份标标识识,, 然然后后将将所所述述用用户户身身份份 标标识识通通过过接接入入网网发发送送至至认认证证实实体体。。  ΑΑ22, "" After the user terminal receives the authentication certificate, please request it, and then read the user's user ID to identify the user's user who saved it in the identification module. The user ’s personal information, and the user ’s personal information will be used as his own personal identity, and then the user ’s personal identity will be described The copy of the identification mark is sent to the authentication entity by sending it through the access network. .
所所述述接接入入网网通通过过 ΕΕΑΑΡΡ协协议议或或 CCHHAAPP协协议议与与用用户户终终端端进进行行通通信信。。 当当通通过过 EEAAPP协协议议发发送送认认证证请请求求时时,, 步步骤骤 AA11中中接接入入网网向向用用户户终终端端发发 送送发发出出认认证证请请求求通通过过 EEAAPP--RReeqquueesstt//IIddeennttiittyy消消息息实实现现;;  The network access mentioned above communicates with the end-user terminal of the user through the ΕΑΑΡΡ agreement or the CCHHAAPP agreement. . When the request for authentication certificate is sent through the EEAAPP protocol agreement, in step AA11, the access network sends the request to the user terminal to send the authentication certificate to the user terminal. Qiutong has realized the message through EEAAPP--RReeqquueesstt // IIddeennttiittyy;
步步骤骤 AA22包包括括::  Step by step AA22 includes:
AA2211、、 * 识发送给接入网; AA2211, * Identification to the access network;
A22、 接入网收到该报文后, 通过 Access-Request 报文发送至 U-AAA, 向 U- AAA发起认证请求。  A22. After receiving the message, the access network sends it to U-AAA through an Access-Request message, and initiates an authentication request to U-AAA.
步骤 B进一步包括:  Step B further includes:
U-AAA将获取到对用户终端进行认证的第二随机数通过接入网发 送至用户终端。  U-AAA sends the second random number obtained by authenticating the user terminal to the user terminal through the access network.
步骤 B中通过接入网发送至用户终端的步骤包括:  The step of sending to the user terminal through the access network in step B includes:
B1、认证实体将所述第二随机数封装在 EAP-Request/UIM/Challenge 报文中, 然后通过 Access-Challenge报文发送给接入网;  B1. The authentication entity encapsulates the second random number in an EAP-Request / UIM / Challenge message, and then sends it to the access network through an Access-Challenge message.
B2、 接入网收到认证实体发送过来的 Access-Challenge报文后, 从 Access-Challenge 艮文剥离出 EAP-Request/UIM/Challenge, 并 J 夺剥离 出的该报文发送至用户终端。  B2. After receiving the Access-Challenge message sent by the authentication entity, the access network strips the EAP-Request / UIM / Challenge from the Access-Challenge text, and sends the packet to the user terminal.
步骤 C进一步包括:  Step C further includes:
在用户终端计算得出第一鉴权数后, 用户终端将第一鉴权数通过接 入网发送至认证实体。  After the user terminal calculates the first authentication number, the user terminal sends the first authentication number to the authentication entity through the access network.
步骤 C中用户终端将第一鉴权数通过接入网发送至认证实体的步骤 包括:  The step of the user terminal sending the first authentication number to the authentication entity through the access network in step C includes:
C 1、用户终端将第一鉴权数通过 EAP-Response/UIM/Challenge报文 发送给接入网;  C 1. The user terminal sends the first authentication number to the access network through an EAP-Response / UIM / Challenge message;
C2、 接入网将收到的 EAP-Response/UIM/Challeng报文, 封装在接 入请求 Access-Request报文中, 并将封装好的 Access-Request报文发送 至认证实体。  C2. The access network encapsulates the received EAP-Response / UIM / Challeng message in an Access-Request message, and sends the encapsulated Access-Request message to the authentication entity.
在执行步骤 C的同时, 进一步包括:  While performing step C, the method further includes:
认证实体通过接入网通知用户终端认证成功 /失败。  The authentication entity notifies the user terminal of the authentication success / failure through the access network.
所述认证实体与归属位置寄存器之间通过 ANSI-41D协议进行通 信。 The authentication entity communicates with the home location register through the ANSI-41D protocol. Letter.
所述接入网为无线局域网。  The access network is a wireless local area network.
从上述方法中可以看出, 本发明具有如下优点和特点:  As can be seen from the above method, the present invention has the following advantages and characteristics:
1、本发明利用已有的 CDMAIS-41核心网支持全国漫游, 不需要再 组建 AN AAA的全国专用网络, 节省了投资成本。  1. The present invention uses the existing CDMAIS-41 core network to support national roaming, and does not need to set up a national dedicated network of AN AAA, which saves investment costs.
2、 在多模网络中进行统一认证, 用户不需手工输入用户名和密码, 使用方便,而且其它网络的业务和 HRPD业务可以通过 IMSI在 HLR中 统一开户、 统一标识、 统一认证, 运营商操作方便。 同时, HRPD用户 可以继续使用 IS95/CDMA2000 lx 用户以前的 UIM 卡, 有利于 IS95/CDMA2000 lx用户向 HRPD用户迁移。  2. Unified authentication in multi-mode networks. Users do not need to manually enter user names and passwords, which is convenient to use, and other network services and HRPD services can be unified account opening, unified identification, and unified authentication in HLR through IMSI, which is easy for operators to operate. . At the same time, HRPD users can continue to use the previous UIM cards of IS95 / CDMA2000 lx users, which will help IS95 / CDMA2000 lx users to migrate to HRPD users.
3、 利用 EAP-UIM协议, 用户终端也可以对网络侧进行认证, 实现 网络与终端之间的相互认证,即网络对终端的认证、终端对网络的认证, 安全性高。 附图简要说明  3. Using the EAP-UIM protocol, the user terminal can also perform authentication on the network side to implement mutual authentication between the network and the terminal, that is, network-to-terminal authentication, and terminal-to-network authentication, with high security. Brief description of the drawings
图 1为 IS95/CDMA2000 lx系统的组网示意图;  Figure 1 shows the networking diagram of the IS95 / CDMA2000 lx system;
图 2为 HRPD网络组网示意图;  Figure 2 is a schematic diagram of HRPD network networking;
图 3为现有技术中 HRPD进行认证的流程示意图;  FIG. 3 is a schematic flowchart of HRPD authentication in the prior art;
图 4为实现本发明的组网结构示意图;  4 is a schematic diagram of a network structure for implementing the present invention;
图 5为实现本发明具体实施例一首次开机进行认证的流程示意图; 图 6为实现本发明实施例一的二次开机进行认证的具体实施例流程 示意图。  FIG. 5 is a schematic flowchart of implementing the first boot-up for authentication according to the first embodiment of the present invention; FIG. 6 is a schematic flowchart of the specific embodiment for implementing the second-booting for authentication according to the first embodiment of the present invention.
图 7为实现本发明具体实施例二首次开机进行认证的流程示意图; 图 8为本发明中的用户终端与接入网络之间通过 CHAP协议进行通 信的实例流程图。 实施本发明的方式 FIG. 7 is a schematic flowchart of implementing authentication for the first time in the second embodiment of the present invention; and FIG. 8 is an example flowchart of communication between a user terminal and an access network in the present invention through a CHAP protocol. Mode of Carrying Out the Invention
本发明的核心内容是: 认证实体采用基于用户标识模块认证机制对 与接入网已建立物理连接的用户终端进行认证, 并将该用户终端自身用 户标识模块中保存的用户信息 ^乍为用户身份标识; 认证实体根据所述用 户身份标识, 产生含有对该用户终端进行认证的第二随机数以及根据网 络侧保存的共享秘密数据计算出的第二随机数所对应的第二鉴权数; 用 户终端根据第二随机数和自身保存的共享秘密数据 SSD进行计算,得出 第一鉴权数,认证实体将第一鉴权数与第二鉴权数进行比较,如果相同, 则认证实体对用户终端认证成功, 否则, 认证失败。  The core content of the present invention is as follows: The authentication entity uses a user identification module-based authentication mechanism to authenticate a user terminal that has been physically connected to the access network, and uses the user information stored in the user terminal's own user identification module to identify the user. Identification; the authentication entity generates, based on the user identity, a second random number containing authentication for the user terminal and a second authentication number corresponding to the second random number calculated based on the shared secret data stored on the network side; the user The terminal calculates according to the second random number and the shared secret data SSD saved by itself, and obtains the first authentication number. The authentication entity compares the first authentication number with the second authentication number. If the authentication number is the same, the authentication entity checks the user. The terminal authentication is successful; otherwise, the authentication fails.
这里,用户终端接入的网络可以为 WLAN网络。认证实体可以为预 先设置的认证服务器, 也可以是原来的鉴权中心。 认证服务器与 HLR 之间可以通过 ANSI-41D协议进行通信。 第二随机数可以是网络侧的任 何实体产生, 比如 HLR/AuC、 AAA 等。 并且 SSD保存在网络侧的 HLR/AuC, 也可以保存在认证服务器中。 当由 HLR/AuC产生第二随机 数时, 第二鉴权数可以直接从 HLR/AuC中获取得到。 当由 AAA产生第 二随机数时, 第二鉴权数可以根据用户身份标识和第一随机数从归属位 置寄存器 /AuC中获取。 AT与 AN之间可以通过 CHAP协议进行通信, 也可以通过 EAP协议进行通信, 也可以采用 CDMA2000原有的空中接 口消息进行通信。  Here, the network accessed by the user terminal may be a WLAN network. The authentication entity can be a preset authentication server or the original authentication center. The authentication server and HLR can communicate through the ANSI-41D protocol. The second random number can be generated by any entity on the network side, such as HLR / AuC, AAA, and so on. And the SSD is stored in the HLR / AuC on the network side, or it can be stored in the authentication server. When the second random number is generated by the HLR / AuC, the second authentication number can be directly obtained from the HLR / AuC. When the second random number is generated by AAA, the second authentication number can be obtained from the home location register / AuC according to the user identity and the first random number. The AT and AN can communicate through the CHAP protocol, or the EAP protocol, or the original CDMA2000 air interface message for communication.
以下参见附图和具体实施例详细说明本发明的技术方案。  The technical solution of the present invention will be described in detail below with reference to the drawings and specific embodiments.
参见图 4所示, 实现本发明方法的组网结构包括 AT、 AN、 基于用 户标识模块的认证、授权和计费服务器(U- AAA )、 PCF、 PDSN、 AAA、 HLR。 这里, AN提供终端和分组交换数据网之间的数据连接, 相当于 CDMA2000 lx中的 BTS和 BSC , 当然也相当于 WLAN; 并且 U-AAA 是预先设置的, 是专门进行认证、 计费的服务器。 这里所用的网元, 如: BTS、 PCF、 PDSN、 HLR无需改动; 用户终 端要求为 HRPD 终端或支持 HRPD 的混合终端, 如: HRPD/GSM、 HRPD/CDMA2000 lx、 HRPD/无线局域网 (WLAN )等, 并且终端硬件 上要支持读 UIM卡或者提供外接读卡器, 支持 EAP-UIM协议, 支持通 过 GSM HLR或 CDMA HLR进行的认证; AN要求在空口和 A12接口 支持 EAP-UIM认证协议, 其中空口是 EAP-UIM over PPP, A12接口是 EAP-UIM over RADIUS 0 AAA可以取消,计费功能由预先设置的 U-AAA 实现。 U-AAA网元取代了 AN AAA,主要要求支持 CDMA的 IS41协议, 并且能够支持 EAP-UIM over RADIUS认证协议。 另外, HLR、 AuC物 理上一般位于同一实体, 以下统一筒称为 HLR。 As shown in FIG. 4, the networking structure for implementing the method of the present invention includes AT, AN, a user identification module-based authentication, authorization, and accounting server (U-AAA), PCF, PDSN, AAA, and HLR. Here, AN provides a data connection between the terminal and the packet-switched data network, which is equivalent to BTS and BSC in CDMA2000 lx, and of course also equivalent to WLAN; and U-AAA is preset and is a server dedicated to authentication and accounting. . The network elements used here, such as: BTS, PCF, PDSN, and HLR, do not need to be changed; user terminals must be HRPD terminals or hybrid terminals that support HRPD, such as: HRPD / GSM, HRPD / CDMA2000 lx, HRPD / Wireless Local Area Network (WLAN), etc. And the terminal hardware must support reading UIM cards or provide external card readers, support EAP-UIM protocol, support authentication through GSM HLR or CDMA HLR; AN requires that the air interface and A12 interface support the EAP-UIM authentication protocol, where the air interface It is EAP-UIM over PPP, and the A12 interface is EAP-UIM over RADIUS 0 AAA can be canceled, and the accounting function is realized by the preset U-AAA. The U-AAA network element replaces the AN AAA, and it is mainly required to support the IS41 protocol of CDMA and be able to support the EAP-UIM over RADIUS authentication protocol. In addition, the HLR and AuC are generally physically located in the same entity, and the unified tube is hereinafter referred to as the HLR.
需要说明的是, 首次开机使用时的认证过程包括首次认证, SSD更 新、 二次认证共三个部分。 AT第一次开机进行的认证为首次认证, 而 且, 在 AT第一次开机时, 由于系统侧和 AT侧保存的 SSD不一致, 所 以 AT首次认证总是失败的。 因此, 在首次认证失败后, 要进行 SSD更 新, 即通过 EAP-REQUEST/UIM/Update消息下发 RANDSSD, 在 AT和 HLR中通过 RANDSSD、 ESN、 A-key经过相同的 SSD生成算法, 计算 出新 SSD。 由于 AT和 HLR侧的上述信息相同, 算法相同, 所以输出的 SSD也相同。 在 SSD进行更新之后, 进行二次认证。 此时, 由于确保了 AT和 HLR侧的 SSD相同, 在正常情况下, 二次认证将会成功。 对于再 次开机的用户, 系统侧和 AT侧的 SSD相同, 以后无须经过 SSD更新和 二次认证, 一次认证即可成功。  It should be noted that the certification process during the first startup includes three parts: first certification, SSD update, and second certification. The authentication performed by the AT for the first time startup is the first authentication, and when the AT is powered on for the first time, the first authentication of the AT always fails because the SSDs stored on the system side and the AT side are inconsistent. Therefore, after the first authentication fails, an SSD update is performed, that is, the RANDSSD is issued through the EAP-REQUEST / UIM / Update message, and the new SSD is calculated through the same SSD generation algorithm through the RANDSSD, ESN, and A-key in the AT and HLR. SSD. Since the above information on the AT and HLR sides is the same and the algorithm is the same, the output SSD is also the same. After the SSD is updated, secondary authentication is performed. At this time, since it is ensured that the SSDs on the AT and HLR sides are the same, under normal circumstances, the secondary authentication will succeed. For the user who restarts the system, the SSDs on the system side and the AT side are the same. In the future, there is no need to go through SSD update and secondary authentication. One authentication will succeed.
下面参见图 8所示, 以 CHAP协议为例说明用户终端与接入网络之 间的通信。 其具体过程如下:  Referring to Figure 8 below, the communication between the user terminal and the access network is described using the CHAP protocol as an example. The specific process is as follows:
步骤 801: AT和 AN之间建立 HRPD会话, AT做好在接入流上交 换数据的准备。 步驟 802: AT和 AN为接入鉴权发起 PPP和 LCP协商。 Step 801: An HRPD session is established between the AT and the AN, and the AT is ready to exchange data on the access stream. Step 802: The AT and AN initiate PPP and LCP negotiation for access authentication.
步骤 803: AN发起一个 Random Challenge, 通过 CHAP Challenge 消息发送给 AT。  Step 803: The AN initiates a Random Challenge and sends it to the AT through a CHAP Challenge message.
步骤 804: AT执行 CAVE-based鉴权, 并且发送 CHAP Response消 步骤 805: AN向 U-AAA发送 A12-Access Request消息。  Step 804: The AT performs CAVE-based authentication and sends a CHAP Response. Step 805: The AN sends an A12-Access Request message to U-AAA.
步骤 806 : U-AAA 根据 A12-Access Request 消息内容, 构造 Step 806: The U-AAA constructs a message according to the content of the A12-Access Request message.
AUTHREQ消息, 并发送给 HLR/AuC。 AUTHREQ message and send it to HLR / AuC.
步驟 807: HLR/AuC执行 CAVE-based鉴权流程, 如果鉴权通过, Step 807: The HLR / AuC executes a CAVE-based authentication process. If the authentication passes,
HLR/AuC将向 U-AAA发送鉴权响应返回结果( authreq )消息, 并包含The HLR / AuC will send an authentication response return result (authreq) message to the U-AAA, and it contains
SSD参数。 SSD parameters.
步骤 808: U-AAA存储由 HLR/AuC分配的 SSD。  Step 808: The U-AAA stores the SSD allocated by the HLR / AuC.
步骤 809: U-AAA向 AN发送 A12-Access Accept消息。  Step 809: The U-AAA sends an A12-Access Accept message to the AN.
步骤 810: AN向 AT返回 CHAP鉴权成功消息( CHAP Authentication Step 810: The AN returns a CHAP authentication success message (CHAP Authentication) to the AT.
Success ) 的指示。 Success).
步骤 811: AT和 AN接着执行后续的处理过程。  Step 811: The AT and AN then perform subsequent processing.
下面结合附图和具体实施例一详细说明本发明的技术方案。  The technical solution of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
参见图 5所示, 当用户终端处于非首次开机状态, 实现鉴权的具体 过程如下:  As shown in FIG. 5, when the user terminal is in a non-first power-on state, the specific process of implementing authentication is as follows:
步骤 501 : WLAN MS和 WLAN之间建立物理连接。  Step 501: A physical connection is established between the WLAN MS and the WLAN.
步骤 502: WLAN MS向 WLAN发起认证请求, 即 WLAN MS向网 络发送 EAPoL-Start报文。  Step 502: The WLAN MS initiates an authentication request to the WLAN, that is, the WLAN MS sends an EAPoL-Start message to the network.
步驟 503 : WLAN 向 WLAN MS 发送请求用 户 名 ( EAP-Request/Identity )报文, 开始进行认证, 要求 WLAN MS将用户 身份标识送上来。 步骤 504: WLAN MS收到 EAP-Request/Identity报文后, 通过相应 的接口, 将 UIM卡中保存的信息读取出来, 作为自己的用户身份标识, 通过响应用户名 ( EAP-Response/Identity ) 艮文发送给 WLAN。 Step 503: The WLAN sends a request for a username (EAP-Request / Identity) message to the WLAN MS, starts authentication, and requests the WLAN MS to send the user identity. Step 504: After receiving the EAP-Request / Identity message, the WLAN MS reads out the information stored in the UIM card through the corresponding interface as its own user identity, and responds to the user name (EAP-Response / Identity). The text is sent to the WLAN.
步骤 505: WLAN收到 EAP-Response/Identity报文后, 通过 Radius 协议里的接入请求 ( Access-Request )报文向 U-AAA发起认证请求, 接 入请求报文里封装了 EAP-Response/Identity报文。  Step 505: After receiving the EAP-Response / Identity message, the WLAN initiates an authentication request to the U-AAA through an Access-Request message in the Radius protocol, and the EAP-Response / Identity message.
步骤 506: U-AAA在接收到 WLAN发送过来的 Access-Request报 文后, 取出其中携带的用户身份标识, 然后根据自身的相关配置信息判 断该用户标识类型,如果是 UIM类型,则在接入查询( Access-Challenge ) 艮文中封装请求 EAP-UIM认证开始 (EAP-Request/UIM/Start )报文, 然后向 WLAN发送, 否则, 不予处理。  Step 506: After receiving the Access-Request message sent by the WLAN, the U-AAA takes out the user identity carried in the U-AAA, and then judges the type of the user identity according to its related configuration information. If it is a UIM type, it is accessing A query (Access-Challenge) message is encapsulated in an EAP-UIM authentication start (EAP-Request / UIM / Start) message, and then sent to the WLAN; otherwise, it is not processed.
步骤 507: WLAN 收到 Access-Challenge报文后, 剥离出其中的 EAP-Request/UIM/Start报文, 然后将剥离出的报文向 WLAN MS发送。  Step 507: After receiving the Access-Challenge message, the WLAN strips the EAP-Request / UIM / Start message, and then sends the stripped message to the WLAN MS.
步骤 508:在 WLAN MS收到 WLAN发送的 EAP-Request/UIM/Start 报文后, WLAN MS将自身产生的一个随机数 Nonce— MT, 包括在属性 AT— NONCE—MT 中 , 然后向 WLAN 发送含有该随机数的 EAP-Response/UIM/Start报文, 表示同意使用 EAP-UIM认证协议。  Step 508: After the WLAN MS receives the EAP-Request / UIM / Start message sent by the WLAN, the WLAN MS includes a random number Nonce_MT generated by itself, and includes it in the attribute AT_NONCE_MT, and then sends to the WLAN The random number of the EAP-Response / UIM / Start message indicates that the EAP-UIM authentication protocol is agreed to be used.
步驟 509: WLAN接收到 WLAN MS发出的 EAP-Response/UIM/Start 报文后,将 EAP-Response/UIM/Start报文封装在 Access-Request消息里, 然后将 Access-Request消息向 U-AAA发送。  Step 509: After receiving the EAP-Response / UIM / Start message from the WLAN MS, the WLAN encapsulates the EAP-Response / UIM / Start message in an Access-Request message, and then sends the Access-Request message to U-AAA. .
步骤 510: U-AAA接收到 LAN发送过来的 Access-Request报文 后, 确定采用独特查询方式, 即 U-AAA产生对 WLAN MS进行认证的 随机数 ( RANDU )—第二随机数, 并且根据自身保存的 SSD计算出该 随机数对应的第二鉴权数 ( AUTHU2 ), 从而形成一个鉴权集。  Step 510: After receiving the Access-Request message sent by the LAN, the U-AAA determines to adopt a unique query method, that is, the U-AAA generates a random number (RANDU) -the second random number for authenticating the WLAN MS, and according to itself, The saved SSD calculates the second authentication number (AUTHU2) corresponding to the random number, thereby forming an authentication set.
步骤 511: U-AAA将 RANDU封装在 EAP-Request/UIM/Challenge 报文中, 然后通过 Access-Challenge报文将 RANDU和 MAC发送给 LAN; 这里, MAC由 U-AAA根据接收到的随机数 Nonce_MT和准备 下发的 EAP-Request报文产生。 Step 511: U-AAA encapsulates RANDU in EAP-Request / UIM / Challenge In the message, the RANDU and MAC are then sent to the LAN through the Access-Challenge message; here, the MAC is generated by U-AAA according to the received random number Nonce_MT and the EAP-Request message to be issued.
步骤 512: 当 WLAN收到 U-AAA发送过来的 Access-Challenge报 文后 , 从 Access-Challenge报文剥离出 EAP-Request UIM/Challenge, 并 且将剥离出的该报文发送至 WLAN MS。  Step 512: After the WLAN receives the Access-Challenge message sent by the U-AAA, it strips the EAP-Request UIM / Challenge from the Access-Challenge message, and sends the stripped message to the WLAN MS.
步骤 513: 当 WLAN MS收到 EAP-Request/UIM/Challenge报文后, 首先验证收到的 EAP报文中的 MAC是否正确,如果错误,则 WLAN MS 向网络发送错误报文,中止本次过程,否则,取出其中的 RANDU、 WLAN MS, 根据 RANDU和从 UIM中获取的 ESN、 SSD、 MIN计算得出第一 鉴权数( AUTHU1 )。  Step 513: When the WLAN MS receives the EAP-Request / UIM / Challenge message, it first verifies that the MAC in the received EAP message is correct. If it is wrong, the WLAN MS sends an error message to the network and terminates the process. Otherwise, the RANDU and WLAN MS are taken out, and the first authentication number (AUTHU1) is calculated according to the RANDU and the ESN, SSD, and MIN obtained from the UIM.
步骤 514: WLAN MS AUTHU1 ESN、 MIN和重新计算得到的 MAC通过 EAP-Response/UIM/Challenge报文发送给 WLAN。  Step 514: The WLAN MS AUTHU1 ESN, MIN, and the recalculated MAC are sent to the WLAN through an EAP-Response / UIM / Challenge message.
步骤 515: WLAN将收到的 EAP-Response UIM/Challeng报文封装 在 Radius 协议的接入请求 (Access-Request )报文中, 并将封装好的 Access-Request 艮文发送至 U-AAA。  Step 515: The WLAN encapsulates the received EAP-Response UIM / Challeng message in an access request (Access-Request) message of the Radius protocol, and sends the encapsulated Access-Request message to U-AAA.
步骤 516: U- AAA收到 WLAN发送的 Access-Request报文后, 解 析出其中的 AUTHU1 ,并判断 AUTHU1与自身计算获得的 AUTHU2是 否一致, 如果一致, 则U-AAA对WLAN MS的认证通过, 否则, 认证 过程失败。  Step 516: After receiving the Access-Request packet sent by the WLAN, U-AAA parses AUTHU1 and judges whether AUTHU1 is consistent with AUTHU2 calculated by itself. If they are consistent, U-AAA passes the WLAN MS authentication. Otherwise, the authentication process fails.
步骤 517: U-AAA向 WLAN网络侧发送含有 EAP-Success报文的 Access-Accept 报文 (认证成功); 或 U-AAA 向 WLAN 发送含有 EAP-Failure 4艮文的 Access-Reject 4艮文(认证失败)。  Step 517: U-AAA sends an Access-Accept message containing the EAP-Success message to the WLAN network side (authentication is successful); or U-AAA sends an Access-Reject 4 message containing the EAP-Failure 4 message to the WLAN ( Authentication failed).
步骤 518: 当 WLAN收到 U- AAA发送的 Access-Accept报文后, 剥 离出其中的 EAP-Success报文, 并将 EAP-Success报文发送至 WLAN MS, 通知 WLAN MS认证成功; 如果接收到 Access-Reject报文后, 剥 离出其中的 EAP-Failure报文, 发送各 WLAN MS, 通知 WLAN MS认 证失败。 Step 518: After the WLAN receives the Access-Accept message sent by the U-AAA, it strips out the EAP-Success message and sends the EAP-Success message to the WLAN. The MS notifies the WLAN MS that the authentication is successful. If the Access-Reject message is received, the EAP-Failure message is stripped out, and each WLAN MS is sent to notify the WLAN MS of the authentication failure.
参见图 6所示, 当 AT处于首次开机状态, 进行鉴权的具体过程如 下:  As shown in Figure 6, when the AT is in the first power-on state, the specific process of performing authentication is as follows:
步骤 601 ~ 615同图 5的 501-515步骤。  Steps 601 to 615 are the same as steps 501-515 in FIG. 5.
步骤 616 ~ 617 : U-AAA 设备将 AUTHU1 与保存在本机中的 AUTHU1 进行比较, 如果一致, 表示客户端认证通过, 并通过 WLAN 向 WLAN MS发送 EAP - Success消息, 否则, 向 HLR回应认证失败的 消息, HLR收到返回响应后, 随机产生 RANDSSD和 RANDU两个随 机数, 并且根据 RANDU 计算对应的 AUTHU, 然后再将 ANDSSD RANDU/AUTHU发送至 U-AAA, 启动更新 SSD的流程。  Steps 616 to 617: The U-AAA device compares AUTHU1 with AUTHU1 stored in the local machine. If they are the same, it means that the client is authenticated and sends an EAP-Success message to the WLAN MS via WLAN. Otherwise, it responds to the HLR with authentication failure. After receiving the response from the HLR, the HLR randomly generates two random numbers, RANDSSD and RANDU, and calculates the corresponding AUTHU according to the RANDU, and then sends the ANDSSD RANDU / AUTHU to U-AAA to start the process of updating the SSD.
步驟 618: U- AAA向 WLAN发送 Access-Challenge报文,里面含有 携带 RADNSSD随机数的 EAP-Request/UIM/Update报文。  Step 618: U-AAA sends an Access-Challenge message to the WLAN, which contains an EAP-Request / UIM / Update message carrying a RADNSSD random number.
步骤 619: WLAN将 EAP-Request UIM/Update报文发送至 WLAN 步 骤 620 : WLAN MS 接 收到 WLAN 发送过来 的 EAP-Request/UIM/Update报文后, 解析出其中的 RANDSSD, 然后计算 得出自己新 SSD, 并且, 随机产生一个随机数 RANDBS, 根据新 SSD 计算 出 对应 的鉴权数 AUTHBS , 然后将 RANDBS 通过 EAP-Response/UIM/Challenge报文发送至 WLAN, 开始对 U-AAA进行 认证。  Step 619: The WLAN sends an EAP-Request UIM / Update message to the WLAN. Step 620: After receiving the EAP-Request / UIM / Update message sent by the WLAN, the WLAN MS parses out the RANDSSD and calculates its new value. An SSD, and randomly generates a random number RANDBS, calculates a corresponding authentication number AUTHBS according to the new SSD, and then sends the RANDBS to the WLAN through an EAP-Response / UIM / Challenge message, and starts to authenticate U-AAA.
步骤 621: WLAN 以 EAP Over RADIUS 的报文格式将 EAP-Response/UIM/Challenge发送给认证服务器 U-AAA。  Step 621: The WLAN sends the EAP-Response / UIM / Challenge to the authentication server U-AAA in the EAP Over RADIUS message format.
步骤 622: U-AAA收到 EAP-Response/UIM/Challenge后, 通过和 HLR 交互获得基站查询随机数(RANDBS )及其对应的查询鉴权结果 ( AUTHBS ), 这里, HLR随机产生 RANDBS, 并且根据该随机数和自 身保存的 SSD进行计算得出 AUTHBS。 Step 622: After receiving the EAP-Response / UIM / Challenge, the U-AAA passes and The HLR interacts to obtain the base station query random number (RANDBS) and its corresponding query authentication result (AUTHBS). Here, the HLR randomly generates RANDBS, and calculates AUTHBS according to the random number and the SSD saved by itself.
步驟 623: U- AAA向 WLAN发送 Access-Challenge报文,里面含有 携带 AUTHBS 鉴权数的 EAP-Request UIM/Challenge报文。  Step 623: The U-AAA sends an Access-Challenge message to the WLAN, which contains an EAP-Request UIM / Challenge message carrying the AUTHBS authentication number.
步骤 624: WLAN收到 EAP-Request/UIM/Challenge报文后,将该报 文发送至 WLAN MS。  Step 624: After receiving the EAP-Request / UIM / Challenge message, the WLAN sends the message to the WLAN MS.
步 骤 625 : WLAN MS 接 收到 WLAN 发送过来 的 EAP-Request/UTM/Challenge报文后, 解析出其中的 AUTHBS, 然后比 较解析出的 AUTHBS 与自身计算的 AUTHBS是否一致, 如果一致, WLAN MS对 U-AAA认证通过, 然后发送 EAP-Response/UIM/success 报文至 WLAN。  Step 625: After receiving the EAP-Request / UTM / Challenge message sent by the WLAN, the WLAN MS parses out the AUTHBS in the EAP-Request / UTM / Challenge message, and then compares whether the parsed AUTHBS is consistent with the AUTHBS calculated by the WLAN MS. The AAA authentication is passed, and then an EAP-Response / UIM / success message is sent to the WLAN.
步骤 626: WLAN收到该报文后, 以 Access-Request的报文格式将 EAP-Response UIM/success发送给认证服务器 U-AAA,并且带上相关的 RADIUS的属性, 说明 SSD更新过程结束。  Step 626: After receiving the message, the WLAN sends the EAP-Response UIM / success to the authentication server U-AAA in the format of an Access-Request message with the relevant RADIUS attributes, indicating that the SSD update process is over.
步骤 627: U-AAA接收到 WLAN发送过来的 Access-Request报文 后,根据在步骤 616中从 HLR接收到的 RANDU和 AUTHU, 确定采用 独特查询方式; 步骤 628 -步驟 635同图 5的 511 ~ 518步驟。  Step 627: After receiving the Access-Request message sent by the WLAN, U-AAA determines the unique query method based on the RANDU and AUTHU received from the HLR in step 616; Steps 628-Step 635 are the same as 511 in FIG. 5 ~ Step 518.
步骤 632中, U-AAA同时通知 HLR/AuC更新存储在 AuC中的 SSD, AuC根据接收到的通知消息更新本地的 SSD。  In step 632, the U-AAA simultaneously notifies the HLR / AuC to update the SSD stored in the AuC, and the AuC updates the local SSD according to the received notification message.
下面结合附图和具体实施例二详细说明本发明的技术方案。  The technical solution of the present invention will be described in detail below with reference to the drawings and specific embodiment 2.
参见图 7所示, 本实施例采用全球认证方式, 对 WLAN MS进行认 证的过程如下:  As shown in FIG. 7, in this embodiment, a global authentication method is used, and the process of authenticating a WLAN MS is as follows:
步骤 701: WLAN MS和 WLAN之间建立物理连接。  Step 701: A physical connection is established between the WLAN MS and the WLAN.
步驟 702: WLAN MS向网络请求进行认证, 即 WLAN MS向网络 发送 EAPoL-Start报文。 Step 702: the WLAN MS requests authentication from the network, that is, the WLAN MS requests the network Send an EAPoL-Start message.
步骤 703 : WLAN 向 WLAN MS 发送请求 用 户 名 ( EAP-Request/Identity )报文, 开始进行认证, 要求 WLAN MS将用户 身份标识送上来。  Step 703: The WLAN sends a request username (EAP-Request / Identity) message to the WLAN MS to start authentication, and requests the WLAN MS to send the user identity.
步驟 704: WLAN MS收到 EAP-Request/Identity报文后, 通过相应 的接口, 将 UIM卡中保存的信息读取出来, 作为自己的用户身份标识, 通过响应用户名 ( EAP-Response/Identity ) 4艮文发送给 WLAN。  Step 704: After receiving the EAP-Request / Identity message, the WLAN MS reads out the information stored in the UIM card through the corresponding interface as its own user identity, and responds to the user name (EAP-Response / Identity). 4 The text is sent to the WLAN.
步骤 705: WLAN收到 EAP-Response Identity 艮文后, 通过 Radius 协议里的接入请求(Access-Request )报文向 U-AAA发起认证请求, 报 文里封装了 EAP-Response/Identity报文。  Step 705: After receiving the EAP-Response Identity message, the WLAN initiates an authentication request to the U-AAA through an Access-Request message in the Radius protocol, and the message encapsulates an EAP-Response / Identity message.
步骤 706: U-AAA在接收到 WLAN发送过来的 Access-Request报 文后, 取出其中携带的用户标识; 然后根据自身的相关配置信息判断该 用户标识类型, 如果是 UIM类型, 则在接入查询 (Access-Challenge ) 报文中封装请求 EAP-UIM认证开始 (EAP-Request UIM/Start )报文, 然后向 WLAN发送, 否则, 不予处理。  Step 706: After receiving the Access-Request message sent by the WLAN, the U-AAA extracts the user ID carried in the Access-Request packet, and then judges the type of the user ID according to its related configuration information. If it is a UIM type, it queries the access. The (Access-Challenge) message encapsulates a request for EAP-UIM authentication start (EAP-Request UIM / Start) message, and then sends it to the WLAN, otherwise, it is not processed.
步骤 707: WLAN 收到 Access-Challenge报文后, 剥离出其中的 EAP-Request/UIM/Start报文, 然后将剥离出的报文向 WLAN MS发送; 步骤 708:在 WLAN MS收到 WLAN发送的 EAP-Request/UIM/Start 报文后, 向 WLAN发送 EAP-Response/UIM/Start报文, 表示同意使用 EAP-UIM认证协议。  Step 707: After receiving the Access-Challenge message, the WLAN strips out the EAP-Request / UIM / Start message, and then sends the stripped message to the WLAN MS. Step 708: The WLAN MS receives the After the EAP-Request / UIM / Start message, it sends an EAP-Response / UIM / Start message to the WLAN, indicating that it agrees to use the EAP-UIM authentication protocol.
步骤 709: WLAN接收到 WLAN MS发出的 EAP-Response UIM/Start 报文后,将 EAP-Response/UIM/Start报文封装在 Access-Request消息里 , 然后将 Access-Request消息向 U-AAA发送。  Step 709: After receiving the EAP-Response UIM / Start message from the WLAN MS, the WLAN encapsulates the EAP-Response / UIM / Start message in an Access-Request message, and then sends the Access-Request message to U-AAA.
步骤 710: U-AAA接收到 WLAN发送过来的 Access-Request报文 后, 确定采用全球认证方式, 即 U- AAA产生对 WLAN MS进行认证的 随机数 ( RAND )—第二随机数, 并且根据自身保存的 SSD计算出该随 机数对应的第二鉴权数(AUTHR2 ),从而形成一个鉴权集,并且 U-AAA 利用一定的算法计算出相应消息认证码 ( MAC )。 Step 710: After receiving the Access-Request message sent by the WLAN, the U-AAA determines that the global authentication method is adopted, that is, the U-AAA generates an authentication method for the WLAN MS. Random number (RAND) —a second random number, and a second authentication number (AUTHR2) corresponding to the random number is calculated according to the SSD saved by the self to form an authentication set, and U-AAA uses a certain algorithm to calculate Corresponding message authentication code (MAC).
步 骤 711 : U-AAA 将 RAND 和 MAC 封 装 在 EAP-Request/UIM/Challenge报文中, 然后通过 Access-Challenge报文发 送给 WLAN。  Step 711: U-AAA encapsulates the RAND and MAC in the EAP-Request / UIM / Challenge message, and then sends it to the WLAN through the Access-Challenge message.
步骤 712: 当 WLAN收到 U-AAA发送过来的 Access-Challenge报 文后, 从 Access-Challenge报文剥离出 EAP-Request/UIM/Challenge, 并 且将剥离出的该报文发送至 WLAN MS。  Step 712: After the WLAN receives the Access-Challenge message sent by the U-AAA, it strips out the EAP-Request / UIM / Challenge from the Access-Challenge message, and sends the stripped message to the WLAN MS.
步骤 713: 当 WLAN MS收到 EAP-Request/UIM/Challenge报文后, 取出其中的 RAND, WLAN MS根据 RAND和从 UIM卡读取的密码计 算得出第一鉴权数( AUTHR1 )。  Step 713: After the WLAN MS receives the EAP-Request / UIM / Challenge message, it takes out the RAND in it, and the WLAN MS calculates the first authentication number (AUTHR1) according to the RAND and the password read from the UIM card.
步骤 714: 1^^ ]\48将八1111¾1、£8>1、]^1^ ]\^^以及 RANDC, 通过 EAP-Response UIM/Challenge报文发送给 WLAN。 这里, RA DC 由 WLAN MS才艮据接收到的 RAND导出。  Step 714: 1 ^^] \ 48 sends 81111¾1, £ 8> 1,] ^ 1 ^] \ ^^, and RANDC to the WLAN through the EAP-Response UIM / Challenge message. Here, the RA DC is derived by the WLAN MS according to the received RAND.
步骤 715: WLAN将收到的 EAP-Response/UIM/Challeng报文封装 在 Radius 协议的接入请求 (Access-Request )报文中, 并将封装好的 Access-Request才艮文发送至 U-AAA。  Step 715: The WLAN encapsulates the received EAP-Response / UIM / Challeng message in an Radius protocol Access-Request message, and sends the encapsulated Access-Request message to U-AAA. .
步骤 716: U-AAA收到 WLAN发送的 Access-Request报文后, 根 据其中的 RANDC确定对应 RAND; 然后 U-AAA判断是否已经得到用 户的 SSD, 如果是, 解析出其中的 AUTHR1 , 接收到的 AUTHR1与自 身保存的是否该用户终端的 AUTHR2是否一致, 如果一致, 则 U-AAA 对 WLAN MS的认证通过, 否则, 认证过程失败。  Step 716: After receiving the Access-Request message sent by the WLAN, the U-AAA determines the corresponding RAND according to the RANDC in the U-AAA; then the U-AAA judges whether the user's SSD has been obtained, and if so, parses out the AUTHR1 among them. Whether AUTHR1 is consistent with the AUTHR2 of the user terminal stored by itself. If they are the same, the U-AAA authentication of the WLAN MS is passed; otherwise, the authentication process fails.
步骤 717: U-AAA向 WLAN发送含有 EAP-Success和 MAC值的报 文的认证成功 ( Access- Accept )报文; 或 U-AAA向 WLAN发送含有 EAP-Failure报文和 MAC值的认证失败 ( Access-Reject )报文。 Step 717: U-AAA sends an Authentication Success (Access-Accept) message to the WLAN containing the EAP-Success and MAC values; or U-AAA sends EAP-Failure message and MAC-value authentication failure (Access-Reject) message.
步驟 718: 当 WLAN收到 U-AAA发送的 Access-Accept报文后,剥 离出其中的 EAP-Success拫文, 并将 EAP-Success报文发送至 WLAN MS, 通知 WLAN MS认证成功; 如果接收到 Access-Reject报文后, 剥 离出其中的 EAP-Failure报文 , 发送各 WLAN MS, 通知 WLAN MS认 证失败。 当 WLAN MS首先对 MAC进行校验, 只有当接收到的 MAC 值与本地计算得到的 MAC—致时,才确认该 EAP-request消息报文是正 确的。  Step 718: After the WLAN receives the Access-Accept message sent by the U-AAA, it strips out the EAP-Success message and sends the EAP-Success message to the WLAN MS to notify the WLAN MS that the authentication is successful. After the Access-Reject message, the EAP-Failure message is stripped out, and each WLAN MS is sent to notify the WLAN MS of the authentication failure. When the WLAN MS first checks the MAC, it only confirms that the EAP-request message is correct when the received MAC value matches the locally calculated MAC.
通过上述实施例可以看出, 当用户需要接入 WLAN - 3GPP2互通网 络时, 或者网络需要对已经认证通过的 WLAN用户进行重新认证时, 启动本流程。  It can be seen from the above embodiments that when a user needs to access the WLAN-3GPP2 interworking network, or when the network needs to re-authenticate a WLAN user who has been authenticated, this process is started.
实施例一是唯一查询流程, 实施例二是全球认证流程, 二者在流程 上基本相同, 只是 U- AAA对 WLAN MS进行认证时, 产生的随机数类 型不同, 且 WLAN MS和 U-AAA之间的认证消息中携带的参数有所不 同。  The first embodiment is a unique query process, and the second embodiment is a global authentication process. The two processes are basically the same, except that when the U-AAA authenticates the WLAN MS, the types of random numbers generated are different, and WLAN MS and U-AAA are different. The parameters carried in the authentication message vary from time to time.
实施例一和实施例二的主要不同点:  The main differences between the first embodiment and the second embodiment:
( 1 ) 产生的随机数类型不同。 对于独特查询方式, U-AAA产生 RANDU和 AUTHU;对于全球认证方式, U-AAA产生 RAND和 AUTHR。  (1) The types of random numbers generated are different. For unique query methods, U-AAA generates RANDU and AUTHU; for global authentication methods, U-AAA generates RAND and AUTHR.
( 2 )对于独特查询方式,当 U-AAA将生成的 RANDU发送给 WLAN MS时, WLAN MS通过 CAVE算法, 以 RANDU、 A-key、 MIN和 ESN 作为输入参数,生成 AUTHU;对于全球认证,当 U-AAA将生成的 RAND 发送给 WLAN MS时, WLAN MS通过 CAVE算法, 以 RAND, A-key, MIN, ESN作为输入参数, 生成 AUTHR。  (2) For the unique query method, when U-AAA sends the generated RANDU to the WLAN MS, the WLAN MS uses the CAVE algorithm and uses RANDU, A-key, MIN, and ESN as input parameters to generate AUTHU; for global authentication, when When U-AAA sends the generated RAND to the WLAN MS, the WLAN MS generates the AUTHR by using the CAVE algorithm with RAND, A-key, MIN, and ESN as input parameters.
( 3 )对于独特查询, LAN MS在计算出 AUTHU后, 向 U-AAA 发送该参数;对于全球认证, WLAN MS在计算出 AUTHR后,向 U-AAA 发送该参数, 并同时向 U-AAA发送 RANDC参数, 该参数根据 RAND 导出。 (3) For a unique query, the LAN MS sends the parameter to U-AAA after calculating AUTHU; for global authentication, the WLAN MS sends U-AAA to U-AAA after calculating AUTHR Send this parameter and send RANDC parameter to U-AAA at the same time, this parameter is derived according to RAND.
实施例一和实施例二的相同点:  The same points as in the first embodiment and the second embodiment:
( 1 ) WLAN MS在计算出 AUTHU或 AUTHR后, 向 U-AAA发送 响应消息, 响应消息中均包括 WLAN MS的电子序列号(ESN )和移动 用户标识号 (MIN )。  (1) After calculating the AUTHU or AUTHR, the WLAN MS sends a response message to the U-AAA. The response message includes the electronic serial number (ESN) and mobile subscriber identification number (MIN) of the WLAN MS.
( 2 ) WLAN MS在接收到 U-AAA发送来的 UIM认证开始消息 ( EAP-request/UIM/Start ) 后, WLAN MS 内部生成一随机数 (2) After receiving the UIM authentication start message (EAP-request / UIM / Start) sent by U-AAA, the WLAN MS internally generates a random number
AT— NONCE—MT, 并将该随机数通过消息 EAP-response/UIM/Start发送 给 U-AAA, 作为终端对网络的认证参数。 AT—NONCE—MT, and sends the random number to U-AAA through the message EAP-response / UIM / Start as the terminal-to-network authentication parameter.
( 3 ) U-AAA接收到 WLAN MS发送来的 AT— NONCE— MT后, 通 过算法计算响应 MAC, 并将 MAC通过随后的 EAP-request消息发送给 WLAN MS, WLAN MS首先对 MAC进行校验, 只有当接收到的 MAC 参数与本地计算得到的 MAC—致时,才确认该 EAP-request消息报文是 正确的。  (3) After U-AAA receives the AT_NONCE_MT sent by the WLAN MS, it calculates the response MAC through an algorithm, and sends the MAC to the WLAN MS through a subsequent EAP-request message. The WLAN MS first checks the MAC. Only when the received MAC parameters match the locally calculated MACs, it is confirmed that the EAP-request message is correct.
总之, 以上所述仅为本发明的较佳实施例而已, 并非用于限定本发 明的保护范围。  In short, the above descriptions are merely preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention.

Claims

权利要求书 Claim
1、一种实现高速率分组数据业务认证的方法, 其特征在于, 该方法 包括以下步骤:  1. A method for implementing high-rate packet data service authentication, characterized in that the method includes the following steps:
A. 认证实体采用基于用户标识模块认证机制对与接入网已建立物 理连接的用户终端进行认证, 并将该用户终端自身用户标识模块中保存 的用户信息作为用户身份标识;  A. The authentication entity uses a user identification module-based authentication mechanism to authenticate a user terminal that has established a physical connection with the access network, and uses the user information stored in the user terminal's own user identification module as the user identity;
B. 认证实体根据所述用户身份标识, 获取含有对该用户终端进行 认证的第二随机数以及第二随机数对应的第二鉴权数, 所述第二鉴权数 是根据网络侧保存的该用户终端的共享秘密数据 SSD计算出;  B. The authentication entity obtains, according to the user identity, a second random number that authenticates the user terminal and a second authentication number corresponding to the second random number, where the second authentication number is stored according to the network Calculated by the shared secret data SSD of the user terminal;
C. 所述用户终端根据第二随机数和自身保存的 SSD计算得出第一 鉴权数, 认证实体将第一鉴权数与第二鉴权数进行比较, 如果相同, 则 认证实体对用户终端认证成功 , 否则, 认证失败。  C. The user terminal calculates the first authentication number according to the second random number and the SSD saved by the user terminal, and the authentication entity compares the first authentication number with the second authentication number. If the authentication number is the same, the authentication entity performs authentication on the user. The terminal authentication succeeded, otherwise, the authentication failed.
2、根据权利要求 1所述的方法, 其特征在于, 所述认证实体为预先 设置的认证服务器, 或无线移动通信系统中的鉴权中心。  2. The method according to claim 1, wherein the authentication entity is a preset authentication server or an authentication center in a wireless mobile communication system.
3、根据权利要求 2所述的方法, 其特征在于, 当认证实体为无线移 动通信系统中的鉴权中心时, 所述第二随机数无线移动通信系统中的鉴 权中心产生, 并且所述 SSD保存在网络侧的归属位置寄存器 HLR/鉴权 中心 AuC。  3. The method according to claim 2, characterized in that when the authentication entity is an authentication center in a wireless mobile communication system, the authentication center in the second random number wireless mobile communication system is generated, and the The SSD is stored in the home location register HLR / authentication center AuC on the network side.
4、根据权利要求 2所述的方法, 其特征在于, 当认证实体为预先设 置的认证服务器时, 所述第二随机数是该认证服务器中产生, 并且所述 SSD保存在网络侧的 HLR/AuC , 或该认证服务器中。  4. The method according to claim 2, wherein, when the authentication entity is a preset authentication server, the second random number is generated in the authentication server, and the SSD is stored in a network-side HLR / AuC, or the authentication server.
5、 根据权利要求 1所述的方法, 其特征在于, 在步骤 C认证失败 后, 进一步包括:  5. The method according to claim 1, further comprising: after the authentication in step C fails, further comprising:
认证实体将认证结果通知网络侧的 HLR, HLR判断本次认证是否 是首次认证, 如果是首次认证, 则更新 SSD, 然后执行步骤 C, 否则, 认证失败。 The authentication entity notifies the HLR on the network side of the authentication result, and the HLR determines whether the authentication This is the first authentication. If it is the first authentication, update the SSD, and then perform step C. Otherwise, the authentication fails.
6、 根据权利要求 1所述的方法, 其特征在于, 在步驟0认证失败 后, 进一步包括:  6. The method according to claim 1, further comprising: after the authentication fails in step 0, further comprising:
更新 SSD, 然后再执行步骤(3。  Update the SSD before performing step (3.
7、 根据权利要求 5或 6所述的方法, 其特征在于, 更新 SSD的过 程包括:  7. The method according to claim 5 or 6, wherein the process of updating the SSD comprises:
Dl、 HLR产生 SSD更新随机数, 并且计算出 SSD更新随机数对应 的鉴权数;  Dl and HLR generate SSD update random numbers, and calculate the authentication number corresponding to SSD update random numbers;
D2、 用户终端根据所述 SSD更新随机数, 利用系统原 SSD生成算 法重新计算自身的 SSD, 然后再根据重新计算出的该 SSD计算出 SSD 更新随机数对应的鉴权数;  D2. The user terminal updates the random number according to the SSD, uses the system's original SSD generation algorithm to recalculate its own SSD, and then calculates the authentication number corresponding to the SSD update random number based on the recalculated SSD.
D3、 比较用户终端计算出的鉴权数与 HLR中计算出的鉴权数是否 一致, 如果一致, 则更新用户终端侧的 SSD, 否则, SSD更新失败。  D3. Compare whether the authentication number calculated by the user terminal is consistent with the authentication number calculated in the HLR. If they are the same, update the SSD on the user terminal side; otherwise, the SSD update fails.
8、根据权利要求 7所述的方法,其特征在于,步骤 D1进一步包括: Dl l、 HLR将 SSD更新随机数 ( RADNSSD )及其对应的鉴权数发 送至认证实体;  8. The method according to claim 7, wherein step D1 further comprises: D11, the HLR sends an SSD update random number (RADNSSD) and its corresponding authentication number to the authentication entity;
D12、 认证实体向接入网发送 Access-Challenge 报文, 其中携带 RADNSSD的 EAP-Request UIM/Update报文;  D12. The authenticating entity sends an Access-Challenge message to the access network, which carries an EAP-Request UIM / Update message of RADNSSD;
D13、 接入网将 EAP-Request/UIM/Update报文发送至用户终端。 D13. The access network sends an EAP-Request / UIM / Update message to the user terminal.
9、 根据权利要求 8所述的方法, 其特征在于, 步骤 D2包括: D21、用户终端收到接入网发送的 EAP-Request/UIM Update报文后 , 利用 RANDSSD计算得出新 SSD, 并随机产生随机数 RANDBS, 再根 据新 SSD计算出 RANDBS对应的鉴权数 AUTHBS, 再将 RANDBS通 过 EAP-Response/UIM/Challenge ^艮文发送至接入网; D22、接入网将 EAP-Response/UIM/Challenge消息发送给认证实体; 认证实体通过与 HLR交互获得基站查询随机数 RANDBS及其对应的查 询鉴权数 AUTHBS,所述 AUTHBS是根据 RANDBS和自身保存的 SSD 进行计算得出; 9. The method according to claim 8, wherein step D2 comprises: D21. After receiving the EAP-Request / UIM Update message sent by the access network, the user terminal uses the RANDSSD to calculate a new SSD, and randomly selects the new SSD. Generate a random number RANDBS, and then calculate the authentication number AUTHBS corresponding to the RANDBS according to the new SSD, and then send the RANDBS to the access network through EAP-Response / UIM / Challenge ^; D22. The access network sends the EAP-Response / UIM / Challenge message to the authentication entity. The authentication entity obtains the base station query random number RANDBS and its corresponding query authentication number AUTHBS by interacting with the HLR. The AUTHBS is stored according to RANDBS and itself. Calculated by the SSD;
D23、认证实体向接入网发送 Access-Challenge报文,其中携带鉴权 数 AUTHBS的 EAP-Request UIM/Challenge报文;接入网收到该报文后, 将其发送至用户终端。  D23. The authentication entity sends an Access-Challenge message to the access network, which carries an EAP-Request UIM / Challenge message with an authentication number of AUTHBS. After the access network receives the message, it sends it to the user terminal.
10、 根据权利要求 8所述的方法, 其特征在于, 步骤 D3包括: D31、 用户终端接收到 EAP-Request/UIM/Challenge报文后, 比较其 中的 AUTHBS与自身计算出的 AUTHBS是否一致, 如果一致, 更新用 户终端侧的 SSD , 用户终端对认证实体认证通过, 并发送 EAP-Response/UIM/success才艮文至接入网;  10. The method according to claim 8, wherein step D3 comprises: D31. After receiving the EAP-Request / UIM / Challenge message, the user terminal compares whether the AUTHBS therein is consistent with the AUTHBS calculated by itself. Consistently, update the SSD on the user terminal side, the user terminal authenticates the authentication entity, and sends the EAP-Response / UIM / success message to the access network;
D32、 接入网收到该报文后, 将 EAP-Response/UIM/success发送给 认证实体, 其中携带相关的 RADIUS的属性, 认证实体收到该报文后, 更新用户的 SSD。  D32. After receiving the message, the access network sends EAP-Response / UIM / success to the authentication entity, which carries the relevant RADIUS attributes. After receiving the message, the authentication entity updates the user's SSD.
11、 根据权利要求 7所述的方法, 其特征在于, 步骤 D2中所述自 身的 SSD是根据所述 SSD更新随机数、 电子串号、 移动用户标识、 密 码计算。  11. The method according to claim 7, wherein the SSD in step D2 is calculated according to the SSD update random number, electronic serial number, mobile user identification, and password.
12、 才艮据权利要求 1所述的方法, 其特征在于, 所述步骤 A包括: Al、 接入网向用户终端发出认证请求;  12. The method according to claim 1, wherein the step A comprises: Al. The access network sends an authentication request to the user terminal;
A2、 用户终端收到该认证请求后, 读取用户标识模块中保存的用户 信息, 并将该用户信息作为自己的用户身份标识, 然后将所述用户身份 标识通过接入网发送至认证实体。  A2. After receiving the authentication request, the user terminal reads the user information stored in the user identification module, and uses the user information as its own user identity, and then sends the user identity to the authentication entity through the access network.
13、 根据权利要求 11 所述的方法, 其特征在于, 所述接入网通过 EAP协议或 CHAP协议与用户终端进行通信。 13. The method according to claim 11, wherein the access network communicates with a user terminal through an EAP protocol or a CHAP protocol.
14、 根据权利要求 12所述的方法, 其特征在于, 当通过 EAP协议 发送认证请求时, 步骤 A1 中接入网向用户终端发送发出认证请求通过 EAP-Request/Identity消息实现; 14. The method according to claim 12, wherein when the authentication request is sent through the EAP protocol, the access network sends the authentication request to the user terminal in step A1 through an EAP-Request / Identity message;
步骤 A2包括:  Step A2 includes:
A21、 所述用户终端通过 EAP-Response/Identity报文将用户身份标 识发送给接入网;  A21: The user terminal sends the user identity to the access network through an EAP-Response / Identity message;
A22、 接入网收到该报文后, 通过 Access-Request 报文发送至 U-AAA, 向 U-AAA发起认证请求。  A22. After receiving the message, the access network sends it to U-AAA through an Access-Request message, and initiates an authentication request to U-AAA.
15、根据权利要求 1所述的方法,其特征在于, 步驟 B进一步包括: U-AAA将获取到对用户终端进行认证的第二随机数通过接入网发 送至用户终端。  15. The method according to claim 1, wherein step B further comprises: U-AAA sending the second random number obtained by authenticating the user terminal to the user terminal through the access network.
16、 根据权利要求 15所述的方法, 其特征在于, 步骤 B中通过接 入网发送至用户终端的步骤包括:  16. The method according to claim 15, wherein the step of sending to the user terminal through the access network in step B comprises:
B1、认证实体将所述第二随机数封装在 EAP-Request/UIM/Challenge 报文中, 然后通过 Access-Challenge报文发送给接入网;  B1. The authentication entity encapsulates the second random number in an EAP-Request / UIM / Challenge message, and then sends it to the access network through an Access-Challenge message.
B2、 接入网收到认证实体发送过来的 Access-Challenge报文后, 从 Access-Challenge报文剥离出 EAP-Request/UIM/Challenge, 并且将剥离 出的该报文发送至用户终端。  B2. After receiving the Access-Challenge message sent by the authentication entity, the access network strips the EAP-Request / UIM / Challenge from the Access-Challenge message, and sends the stripped message to the user terminal.
17、根据权利要求 1所述的方法,其特征在于, 步骤 C进一步包括: 在用户终端计算得出第一鉴权数后, 用户终端将第一鉴权数通过接 入网发送至认证实体。  17. The method according to claim 1, wherein step C further comprises: after the user terminal calculates the first authentication number, the user terminal sends the first authentication number to the authentication entity through the access network.
18、 根据权利要求 17所述的方法, 其特征在于, 步骤 C中用户终 端将第一鉴权数通过接入网发送至认证实体的步骤包括:  18. The method according to claim 17, wherein the step of the user terminal sending the first authentication number to the authentication entity through the access network in step C comprises:
C 1、用户终端将第一鉴权数通过 EAP-Response/UIM/Challenge报文 发送给接入网; C2、 接入网将收到的 EAP-Response/UIM/Challeng报文, 封装在接 入请求 Access-Request 艮文中, 并将封装好的 Access-Request 4艮文发送 至认证实体。 C 1. The user terminal sends the first authentication number to the access network through an EAP-Response / UIM / Challenge message; C2. The access network encapsulates the received EAP-Response / UIM / Challeng message in the Access-Request message and sends the encapsulated Access-Request message to the authentication entity.
19、 根据权利要求 1所述的方法, 其特征在于, 在执行步骤 C的同 时, 进一步包括:  19. The method according to claim 1, wherein, when step C is performed, further comprising:
认证实体通过接入网通知用户终端认证成功 /失败。  The authentication entity notifies the user terminal of the authentication success / failure through the access network.
20、 根据权利要求 5所述的方法, 其特征在于, 所述认证实体与归 属位置寄存器之间通过 ANSI-41D协议进行通信。  20. The method according to claim 5, wherein the authentication entity communicates with a home location register through an ANSI-41D protocol.
21、 根据权利要求 1所述的方法, 其特征在于, 所述接入网为无线 局或网。  21. The method according to claim 1, wherein the access network is a wireless office or a network.
PCT/CN2004/000495 2003-05-16 2004-05-17 A method of implementing high speed data packet operation authentication WO2004102874A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN03131035.4 2003-05-16
CN03131035 2003-05-16
CN04007188 2004-03-02
CN200410007188.9 2004-03-02

Publications (1)

Publication Number Publication Date
WO2004102874A1 true WO2004102874A1 (en) 2004-11-25

Family

ID=35578870

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2004/000495 WO2004102874A1 (en) 2003-05-16 2004-05-17 A method of implementing high speed data packet operation authentication

Country Status (3)

Country Link
CN (2) CN1327648C (en)
RU (1) RU2321972C2 (en)
WO (1) WO2004102874A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212295B (en) * 2006-12-26 2010-11-03 财团法人资讯工业策进会 System, device, and method for applying for electronic evidence and transmitting key for mobile electronic device
CN101383816B (en) * 2007-09-06 2015-09-02 财团法人工业技术研究院 wireless network authentication system and method thereof
CN102026184B (en) * 2009-09-16 2013-08-07 华为技术有限公司 Authentication method, authentication system and relevant device
EA017487B1 (en) * 2011-08-18 2012-12-28 Али Магомед Оглы Аббасов Method of information transceiving
WO2019010701A1 (en) * 2017-07-14 2019-01-17 Zte Corporation Methods and computing device for transmitting encoded information during authentication
EP4181093A4 (en) * 2020-07-22 2023-08-23 Huawei Technologies Co., Ltd. Authentication detection method, apparatus and system
CN113904856B (en) * 2021-10-15 2024-04-23 广州威戈计算机科技有限公司 Authentication method, switch and authentication system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341338A (en) * 1999-02-22 2002-03-20 格姆普拉斯公司 Authentication in radiotelephone network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5172414A (en) * 1991-09-13 1992-12-15 At&T Bell Laboratories Speech and control message encrypton in cellular radio
US5943425A (en) * 1996-05-10 1999-08-24 Lucent Technologies, Inc. Re-authentication procedure for over-the-air activation
US5729537A (en) * 1996-06-14 1998-03-17 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for providing anonymous data transfer in a communication system
CN1191703C (en) * 2001-12-31 2005-03-02 西安西电捷通无线网络通信有限公司 Safe inserting method of wide-band wireless IP system mobile terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1341338A (en) * 1999-02-22 2002-03-20 格姆普拉斯公司 Authentication in radiotelephone network

Also Published As

Publication number Publication date
RU2005140546A (en) 2006-07-27
RU2321972C2 (en) 2008-04-10
CN1551561A (en) 2004-12-01
CN1706150A (en) 2005-12-07
CN1327648C (en) 2007-07-18

Similar Documents

Publication Publication Date Title
US7515906B2 (en) Method of implementing authentication of high-rate packet data services
WO2004102884A1 (en) A method for performing authentication in a wireless lan
AU2003243680B2 (en) Key generation in a communication system
US8630414B2 (en) Inter-working function for a communication system
US7760710B2 (en) Rogue access point detection
US8094821B2 (en) Key generation in a communication system
US9232398B2 (en) Method and apparatus for link setup
JP5193850B2 (en) Wireless communication method
CN106921965B (en) Method for realizing EAP authentication in W L AN network
WO2011017924A1 (en) Method, system, server, and terminal for authentication in wireless local area network
CN100334850C (en) A method for implementing access authentication of wireless local area network
WO2004102874A1 (en) A method of implementing high speed data packet operation authentication
CN100527668C (en) Method for implementing compatibility between WAPI protocol and 802.1X protocol
WO2004102883A1 (en) A kind of method to realize user authentication
EP1968274A1 (en) Method for supporting an existing authentication infrastructure

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 20048012910

Country of ref document: CN

REG Reference to national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1073741

Country of ref document: HK

WWE Wipo information: entry into national phase

Ref document number: 3406/CHENP/2005

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2005140546

Country of ref document: RU

122 Ep: pct application non-entry in european phase