WO2006013150A1 - Sim-based authentication - Google Patents

Sim-based authentication Download PDF

Info

Publication number
WO2006013150A1
WO2006013150A1 PCT/EP2005/053443 EP2005053443W WO2006013150A1 WO 2006013150 A1 WO2006013150 A1 WO 2006013150A1 EP 2005053443 W EP2005053443 W EP 2005053443W WO 2006013150 A1 WO2006013150 A1 WO 2006013150A1
Authority
WO
WIPO (PCT)
Prior art keywords
sim
server
password
username
wisp
Prior art date
Application number
PCT/EP2005/053443
Other languages
French (fr)
Inventor
Gunnar Almgren
Original Assignee
Service Factory Sf Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP04445080A external-priority patent/EP1624639B1/en
Application filed by Service Factory Sf Ab filed Critical Service Factory Sf Ab
Publication of WO2006013150A1 publication Critical patent/WO2006013150A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • SIM-based authentication for wireless LAN, WLAN, services recommended by the GSM Association, GSMA, and the Third Generation Partnership Project, 3GPP, relies on EAP-SIM authentication and 802. IX access networks.
  • a considerable part of the WLAN hotspots used by the mobile operators' customers will be provided by third party Wireless ISPs, WISPs, many of which are unlikely to upgrade to network enabling the security protocol 802. IX in the short to medium term future however.
  • Mobile operators therefore need to deploy a SIM-based authentication architecture that works also in an access network that is not 802. IX enabled.
  • a solution based on EAP-SIM but not requiring the security protocol 802. IX is preferable since it provides for the smooth introduction of 802. IX based access network and final migration to a pure 802.1X/EAP-SIM situation.
  • An aim of the present invention is to provide SIM-based authentication over access networks not supporting the security protocol 802. IX.
  • An aspect of the aim is to provide SIM-based authentication for AVLAN services based on EAP-SIM but not requiring the security protocol 802.1X.
  • Another aspect of the aim is to facilitate authentication from both 802. Ix and non-802. Ix hotspots without impacting the EAP-SIM server.
  • FIG. 1 schematically shows an embodiment of the system according to the invention
  • FIG. 2 schematically shows the method steps according to an embodiment of the present invention
  • FIG. 4 schematically shows authentication protocol stacks in the case of an UAM login.
  • the SIM-authentication procedure is performed according to the EAP-SIM but will not be based on an 802. IX access network.
  • the client software will furnish a protocol stack where EAP is transported in some underlying protocol, such as RADIUS or HTTP.
  • FIG. 3 illustrates the authentication protocol stacks for EAP- SIM login, i.e. the first login step (in the case RADIUS is used as bearer).
  • the second step will be based on web-based login according to the Universal Access Method, UAM, defined by the WiFi Alliance.
  • FIG. 4 illustrates the authentication protocol stacks for the UAM login, i.e. the second login step also called the back- authentication step.
  • an embodiment of the inventive system 10 comprises a first access network 20 and a second access network 30.
  • the first access network 20 is realised as a Wireless Internet Service Provider network, WISP network
  • the second access network 30 is realised as a mobile operator network.
  • the WISP network 20 comprises a server 21 for Remote Authentication dial- In User Service, e.g. a RADIUS server, which is communicatively connected to a RADIUS proxy 22.
  • An access server 23 is further comprised in the WISP network 20.
  • the RADIUS proxy 22 and the access server 23 are communicatively connected to a first router 24 comprised in the WISP network 20.
  • the WISP network 20 comprises further one or several access points, AP, 25 communicatively connected to the access server 23.
  • the special RADIUS proxy server, Orbyte Service Controller Plus, OSC+, 33 will act as a front-end towards the EAP-SIM server 31.
  • proxy servers OSC+ may be deployed depending on the desired performance and resilience levels required.
  • the mobile operator server OSC+ 33 is further configured to extract relevant information from the RADIUS exchange between the client and the EAP-SIM server 31 and create the temporary accounts to be inserted into the local database 35.
  • the client and the EAP-SIM server will derive a Master Session Key, MSK, based on the GSM authentication keys.
  • MSK Master Session Key
  • the MSK will be used for the link layer encryption between the client and the access point, AP, 25.
  • the EAP-SIM server will pass the key in the RADIUS access accept message, which is to be received by the AP in the 802. IX and the OSC+ in the non-802. IX case.
  • the first 32 bytes of the MSK will be carried in the attribute MS-MPPE-RECV-KEY and the second 32 bytes in the MS-MPPE- SEND-KEY.
  • the present invention does not use the MSK for link layer encryption, but instead the MSK will be used as a temporary password for the UAM-login that will follow the EAP-SIM authentication.
  • the mobile operator server OSC+ 33 is further configured to extract and remove the MSK and CUID from the RADIUS message before it is passed onwards towards the client's user terminal 40, since these parameters needs to be removed to avoid carrying them in the clear over the radio segment.
  • the first router 24 and the second router 34 are configured to provide communication between the first access network 20 and the second access network
  • the inventive system comprises also one or several user terminals 40 configured to communicate with the mobile operator network 30 via the WISP network 20.
  • the user terminal 40 is realised as a computer, laptop, Personal Digital Assist and/or another computerised device.
  • the present invention comprises the following steps: a) The client software in a user device 40 authenticates towards a mobile operator's EAP-SIM server 31. The authentication procedure will adhere to the EAP-SIM procedure.
  • a mobile operator server OSC+ 33 is configured to extract the MSK and CUID parameters from a RADIUS access accept message emanating from the EAP-SIM server 31 and use this information to derive temporary username/password to be stored in the local database 35.
  • a WISP RADIUS proxy 22 is configured to inspect the realm part of the username, e.g. the "MobileOperator.com" part, and hence proxy the request onwards towards the mobile operator server OSC+ 33.
  • the mobile operator server OSC+ 33 will match the supplied username/password with the temporary account stored in the local database 35. If credentials match, a RADIUS access accept message will be sent towards the WISP RADIUS proxy 22 and temporary credentials will be removed from the local database 35. Unused credentials will be automatically removed from the local database 35 within minutes from its creation.
  • a user terminal 40 connects to an access server 23 of the WISP network 20 via an access point, AP, 25.
  • the user terminal 40 is assigned an IP address from the access server (or AP) a through the exchange of Dynamic Host Control Protocol, DHCP, messages.
  • DHCP Dynamic Host Control Protocol
  • the user terminal 40 sends a RADIUS access request with EAP-SIM authentication to a mobile operator server OSC+ 33 comprised in the mobile operator network 30.
  • the mobile operator server OSC+ 33 forwards the RADIUS access request to an EAP-SIM server 31.
  • the EAP-SIM server 31 creates Master Session Keys, MSK, and Chargeable User ID, CUID, parameters etc.
  • the EAP-SIM server 31 sends a RADIUS access accept message to the mobile operator server OSC+ 33 that extracts the MSK and the CUID parameters from the RADIUS access accept message and uses this information to derive a temporary username and password and then stores these parameters as in a local database 35.
  • the RADIUS access accept message with EAP-SIM authentication is sent to the user terminal 40 via the WISP network 20.
  • a fourth step, 4 the user terminal 40 sends an HTTP request to the access server 23 and the access server 23 sends a login page back to the user terminal 40.
  • a fifth step, 5 the user by means of the user terminal 40 performs a login towards the WISP access server 23.
  • credentials can be derived by slightly different methods, in particular it is possible to opt away from the pseudonym usage and thus use the IMSI carried in the phase 1 exchange as username also in the phase 2 exchange.
  • the WISP access server 23 forwards a RADIUS access request to the WISP RADIUS proxy 22.
  • the WISP RADIUS proxy 22 inspects the realm part of the username, i.e. the MobileOperator.com and forwards the RADIUS access request to the mobile operator server OSC+ 33 comprised in the mobile operator network of the corresponding mobile operator.
  • FIG. 3 and 4 schematically show authentication protocol stacks in the case of an EAP-SIM login and an UAM login, respectively.
  • the RADIUS proxy will only be used if desired as an extra measure to mitigate DOS attacks towards OSC+/EAP-SIM Servers.
  • the present invention is unique because it i.a. embodies a scheme where SIM- authentication can be performed from legacy (non 802.Ix) hotspots using a completely standard EAP-SIM server.
  • the key component of the invention, the OSC+ is configured to hide for the EAP-SIM server the fact that the hotspot is not 802. Ix enabled, i.e. that the request is originating from a non-802. Ix hotspot, whereby non-802. Ix authentication can be provided without impact on the EAP- SIM server.
  • the OSC+ extracts and applies a proprietary logic to the messages sent from the EAP-SIM server and intended for the (in this case the non-existing) 802. Ix AP in order to generate credentials for the phase 2 exchange.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

SIM-based authentication over access networks not supporting the security protocol 802.1X, comprising the steps of: SIM-authentication, wherein a user, by means of a user terminal (40) and via a WISP network (20), authenticates towards an EAP-SIM server (31) comprised in a mobile operator network (30); extracting information used to derive temporarily credentials from an access accept message emanating from said EAP-SIM server (31), and storing these as username/password in a database (35). Further comprising back-authentication, wherein a user performs a login towards a WISP access server (23) using the same username and password derived from information stored on a SIM card, Said WISP access server (23) forwards an access request and said username/password to an OSC+ 33. Further, matching said forwarded username/password with the temporary account stored in said database (35), and if credentials match, sending an accept message towards a WISP proxy (22) that sends a login accept message to said terminal (40).

Description

SIM-BASED AUTHENTICATION
Technical field
The present invention relates to SIM-based authentication, and especially to SIM-based authentication over access networks not supporting the security protocol 802. IX.
Background of the invention
Mobile operators want to deploy services based on Wireless LANs and the standard 802.11 where a traditional GSM or UMTS SIM-card is used for authentication.
The standard approach to SIM-based authentication for wireless LAN, WLAN, services recommended by the GSM Association, GSMA, and the Third Generation Partnership Project, 3GPP, relies on EAP-SIM authentication and 802. IX access networks. A considerable part of the WLAN hotspots used by the mobile operators' customers will be provided by third party Wireless ISPs, WISPs, many of which are unlikely to upgrade to network enabling the security protocol 802. IX in the short to medium term future however. Mobile operators therefore need to deploy a SIM-based authentication architecture that works also in an access network that is not 802. IX enabled.
Solutions for SIM-based authentication that do not require 802. IX exist on the market. One example is given by the international patent application WO 2004/097590 A2, which discloses a method and an apparatus for performing SIM- based authentication and authorisation in a WLAN Internet Service Provider (WISP) network supporting the universal access method (UAM) of authentication and authorisation enabling roaming for customers of mobile service providers onto said networks. According to the disclosure of WO 2004/097590 A2, one and the same unit, i.e. the radio access controller (RAC), handles both the phase- 1 SIM authentication and the phase-2 UAM authentication. A drawback with this and other solutions is that they cannot use a separate standard EAP-SIM server.
A solution based on EAP-SIM but not requiring the security protocol 802. IX is preferable since it provides for the smooth introduction of 802. IX based access network and final migration to a pure 802.1X/EAP-SIM situation.
Summary of the invention An aim of the present invention is to provide SIM-based authentication over access networks not supporting the security protocol 802. IX.
An aspect of the aim is to provide SIM-based authentication for AVLAN services based on EAP-SIM but not requiring the security protocol 802.1X.
Another aspect of the aim is to facilitate authentication from both 802. Ix and non-802. Ix hotspots without impacting the EAP-SIM server.
The aim and the aspect amongst others are achieved by a method and a system according to the independent claims. Embodiments of the invention are defined in the dependent claims.
The following acronyms and abbreviation will be used in the description of the present invention.
3GPP Third Generation Partnership Project
AP Access Point
CUID Chargeable User ID
DB Database
DHCP Dynamic Host Control Protocol
GSM Global System for Mobile Communications
GSMA GSM Association
EAP Extensible Authentication Protocol
HLR Home Location Register
HTTP Hypertext Transfer Protocol
IMSI International Mobile Subscriber Identity
IP Internet Protocol
ISDN Integrated Services Digital Network
ISP Internet Service Provider
LAN Local Area Network
MAP Mobile AP MS Mobile Station
MSISDN Mobile Subscriber ISDN
MSK Master Session Key
OSC+ Orbyte Service Controller Plus
RADIUS Remote Authentication Dial-In User Service
SIM Subscriber Identification Module
UAM Universal Access Method
UMTS Universal Mobile Telecommunications System
WiFi Wireless Fidelity
WISP Wireless ISP
WLAN Wireless LAN
Brief description of the drawings
The present invention will now be described with reference to the accompanying drawings, in which: FIG. 1 schematically shows an embodiment of the system according to the invention;
FIG. 2 schematically shows the method steps according to an embodiment of the present invention;
FIG. 3 schematically shows authentication protocol stacks in the case of an EAP-SIM login; and
FIG. 4 schematically shows authentication protocol stacks in the case of an UAM login.
Detailed description of the invention Solutions for SIM-based authentication that do not require 802. IX exist on the market. However, these solutions are proprietary, i.e. not based on EAP-SIM. The invention described in this document is unique in that it:
- does not require any changes to standard EAP-SIM server. The same server can be used for 802. IX and non 802. IX based authentication, and it - does not require additional technology or software at the WISP. Only support for UAM login and "walled garden" which are standard features. The present invention will now be described with reference to the accompanying figures, FIG. 1 - 4. In the figures, the same reference numerals are used for the same or similar components or parts of the invention.
The invention deploys a two-step login where the end-user in the first step is SIM-authenticated towards a mobile operators EAP-SIM server and then, in a second step, is back-authenticated towards a WISP access gateway using a temporary username/password generated during the SIM-authcntication step.
The SIM-authentication procedure is performed according to the EAP-SIM but will not be based on an 802. IX access network. The client software will furnish a protocol stack where EAP is transported in some underlying protocol, such as RADIUS or HTTP. FIG. 3 illustrates the authentication protocol stacks for EAP- SIM login, i.e. the first login step (in the case RADIUS is used as bearer). The second step will be based on web-based login according to the Universal Access Method, UAM, defined by the WiFi Alliance. FIG. 4 illustrates the authentication protocol stacks for the UAM login, i.e. the second login step also called the back- authentication step.
As schematically illustrated in FIG. 1, an embodiment of the inventive system 10 comprises a first access network 20 and a second access network 30. In the shown embodiment, the first access network 20 is realised as a Wireless Internet Service Provider network, WISP network, and the second access network 30 is realised as a mobile operator network.
The WISP network 20 comprises a server 21 for Remote Authentication dial- In User Service, e.g. a RADIUS server, which is communicatively connected to a RADIUS proxy 22. An access server 23 is further comprised in the WISP network 20. The RADIUS proxy 22 and the access server 23 are communicatively connected to a first router 24 comprised in the WISP network 20. The WISP network 20 comprises further one or several access points, AP, 25 communicatively connected to the access server 23.
The mobile operator network 30 comprises an EAP-SIM server 31 communi- catively connected to a subscriber database 32, e.g. a Home Location Record, HLR5 and a special RADIUS proxy server 33, here denoted as an Orbyte Service Controller Plus, OSC+. The mobile operator server OSC+ 33 is further communicatively connected to a second router 34and to a local database 35. The local database 35 is configured to store information about temporary accounts.
The special RADIUS proxy server, Orbyte Service Controller Plus, OSC+, 33, will act as a front-end towards the EAP-SIM server 31. In fact several proxy servers OSC+ may be deployed depending on the desired performance and resilience levels required. The mobile operator server OSC+ 33 is further configured to extract relevant information from the RADIUS exchange between the client and the EAP-SIM server 31 and create the temporary accounts to be inserted into the local database 35.
The IP address of the mobile operator's OSC+ server 33 is configured as part of the WISP "walled garden".
During the EAP-SIM authentication, the client and the EAP-SIM server will derive a Master Session Key, MSK, based on the GSM authentication keys. In an 802. IX scenario the MSK will be used for the link layer encryption between the client and the access point, AP, 25. The EAP-SIM server will pass the key in the RADIUS access accept message, which is to be received by the AP in the 802. IX and the OSC+ in the non-802. IX case. The first 32 bytes of the MSK will be carried in the attribute MS-MPPE-RECV-KEY and the second 32 bytes in the MS-MPPE- SEND-KEY.
The present invention does not use the MSK for link layer encryption, but instead the MSK will be used as a temporary password for the UAM-login that will follow the EAP-SIM authentication.
The GSM Association had advised the use of a special RADIUS attribute, Chargeable User ID, CUID, in order to inform the visited network of the real identity of the user. This is required since the EAP-SIM login may use pseudonyms as user identities as a measure to protect user privacy. According to the present invention, the visited operator will have the real user information anyway since the IMSI will be used as usemame for the UAM login. However, the CUID will be used by the mobile operator server OSC+ 33 to obtain the username for the temporary account.
The mobile operator server OSC+ 33 is further configured to extract and remove the MSK and CUID from the RADIUS message before it is passed onwards towards the client's user terminal 40, since these parameters needs to be removed to avoid carrying them in the clear over the radio segment.
The first router 24 and the second router 34 are configured to provide communication between the first access network 20 and the second access network
The inventive system comprises also one or several user terminals 40 configured to communicate with the mobile operator network 30 via the WISP network 20. The user terminal 40 is realised as a computer, laptop, Personal Digital Assist and/or another computerised device. In summary, the present invention comprises the following steps: a) The client software in a user device 40 authenticates towards a mobile operator's EAP-SIM server 31. The authentication procedure will adhere to the EAP-SIM procedure. A mobile operator server OSC+ 33 is configured to extract the MSK and CUID parameters from a RADIUS access accept message emanating from the EAP-SIM server 31 and use this information to derive temporary username/password to be stored in the local database 35. b) The client will perform a Universal Access Method, UAM, login towards a WISP access server or gateway 23 using the temporary credentials of the form usi=IMSI@MobileOperator.com/pw=f(MSK), where usr is the username, IMSI is the International Mobile Subscriber Identity, the MobileOperator.com is the realm (domain name) of the mobile operator, pw is the password, and MSK is the Master Session Key. F(MSK) denotes that some function will be applied to derive a valid password from the MSK. The derivation procedure can be something like Base-64 encoding the MSK and then truncating the resulting string to 16 characters (some access gateways does not support passwords longer than 16 characters). Alterna¬ tively, more advanced schemes involving cryptographic algorithms can be applied. c) A WISP RADIUS proxy 22 is configured to inspect the realm part of the username, e.g. the "MobileOperator.com" part, and hence proxy the request onwards towards the mobile operator server OSC+ 33. The mobile operator server OSC+ 33 will match the supplied username/password with the temporary account stored in the local database 35. If credentials match, a RADIUS access accept message will be sent towards the WISP RADIUS proxy 22 and temporary credentials will be removed from the local database 35. Unused credentials will be automatically removed from the local database 35 within minutes from its creation.
The method according to an embodiment of the invention will now be described in more detail with reference to FIG. 2. However, it should be understood that the exchange of RAIDUS-challenge message to carry the EAP-SIM handshake procedure has been omitted in FIG. 2.
In a first step, 1), a user terminal 40 connects to an access server 23 of the WISP network 20 via an access point, AP, 25. The user terminal 40 is assigned an IP address from the access server (or AP) a through the exchange of Dynamic Host Control Protocol, DHCP, messages.
In a second step, 2), the user terminal 40 sends a RADIUS access request with EAP-SIM authentication to a mobile operator server OSC+ 33 comprised in the mobile operator network 30. The mobile operator server OSC+ 33 forwards the RADIUS access request to an EAP-SIM server 31. The EAP-SIM server 31 creates Master Session Keys, MSK, and Chargeable User ID, CUID, parameters etc.
In a third step, 3), the EAP-SIM server 31 sends a RADIUS access accept message to the mobile operator server OSC+ 33 that extracts the MSK and the CUID parameters from the RADIUS access accept message and uses this information to derive a temporary username and password and then stores these parameters as in a local database 35. The RADIUS access accept message with EAP-SIM authentication is sent to the user terminal 40 via the WISP network 20.
In a fourth step, 4), the user terminal 40 sends an HTTP request to the access server 23 and the access server 23 sends a login page back to the user terminal 40. In a fifth step, 5), the user by means of the user terminal 40 performs a login towards the WISP access server 23. In the login procedure, the temporary creden- tials are used, e.g. on the form usr=IMSI@MobileOperator.coin/pw=f(MSK), where usr is the username, IMSI is the International Mobile Subscriber Identity, the MobileOperator.com is the realm (domain name) of the mobile operator, pw is the password, and MSK is the Master Session Key. It should however be understood that credentials can be derived by slightly different methods, in particular it is possible to opt away from the pseudonym usage and thus use the IMSI carried in the phase 1 exchange as username also in the phase 2 exchange.
The WISP access server 23 forwards a RADIUS access request to the WISP RADIUS proxy 22. The WISP RADIUS proxy 22 inspects the realm part of the username, i.e. the MobileOperator.com and forwards the RADIUS access request to the mobile operator server OSC+ 33 comprised in the mobile operator network of the corresponding mobile operator.
In a sixth step, 6), the mobile operator server OSC+ 33 of the mobile operator validates the credentials, i.e. the username/password, against the local database 35. The mobile operator server OSC+ 33 will match the supplied username/password with the temporary account stored in the local database 35. If credentials match, a RADIUS access accept message will be sent from the mobile operator server OSC+ 33 towards the WISP RADIUS proxy 22. The WISP RADIUS proxy 22 forwards the RADIUS access accept message to the WISP access server 23, which sends a login accept message to the user terminal 40.
In a seventh step, 7), the access server 23 sends a RADIUS accounting start message to the mobile operator server OSC+ 33 via the RADIUS proxy 22. The mobile operator server OSC+ 33 saves accounting start using IMSI as user identification and temporary credentials will be removed from the local database 35. Unused credentials will be automatically removed from the local database 35 within minutes from its creation.
In an eighth step, 8), the user gives a logout command by means of the user terminal 40. The logout is forwarded to the RADIUS access server 23 to the mobile operator server OSC+ 33 via the RADIUS proxy 22. The mobile operator server OSC+ 33 saves accounting stop using IMSI as user identification.
FIG. 3 and 4 schematically show authentication protocol stacks in the case of an EAP-SIM login and an UAM login, respectively. In FIG. 3 it should be noted that the RADIUS proxy will only be used if desired as an extra measure to mitigate DOS attacks towards OSC+/EAP-SIM Servers.
The present invention is unique because it i.a. embodies a scheme where SIM- authentication can be performed from legacy (non 802.Ix) hotspots using a completely standard EAP-SIM server. The key component of the invention, the OSC+, is configured to hide for the EAP-SIM server the fact that the hotspot is not 802. Ix enabled, i.e. that the request is originating from a non-802. Ix hotspot, whereby non-802. Ix authentication can be provided without impact on the EAP- SIM server. The OSC+ extracts and applies a proprietary logic to the messages sent from the EAP-SIM server and intended for the (in this case the non-existing) 802. Ix AP in order to generate credentials for the phase 2 exchange.
The present invention has been described with references to an embodiment. However it should be understood that the invention can be modified in different ways without departing from the inventive concept, which is only delimited by the accompanying claims. For example, it is not necessary to use IMSI as username, and one can for example use MSISDN instead of IMSI or use the same username as in the original RAIDUS request (phase 1). Further, it is possible to use other password derivation algorithms and it is possible to use other bearer protocol than RADIUS for EAP, for example HTTP.

Claims

Claims
1. A method for SIM-based authentication over access networks (20, 30) not supporting the security protocol 802. IX, comprising the steps of:
- SIM-authentication, wherein a user, by means of a user terminal (40) and via a WISP network (20), authenticates towards an EAP-SIM server (31) comprised in a mobile operator network (30),
- in a mobile operator server OSC+ (33), extracting from a message sent from the EAP-SIM server (31) in the mobile operator network (30), information used to derive temporarily credentials, e.g. Master Session Key, MSK, and Chargeable User ID, CUID, parameters, from an RADIUS access accept message emanating from the EAP-SIM server (31), and storing the temporary credentials (username/password) in a local database (35);
- deriving temporary credentials (username/password) in the user terminal (40) from information stored on a SIM-card and - back-authentication, wherein a user performs a login towards a WISP access server (23) using said username/password, and wherein said WISP access server (23) forwards an access request and said username/password to said mobile operator server OSC+ (33); and
- in said mobile operator server OSC+ (33), matching said forwarded username/password with the temporary credentials stored in said local database
(35), and if credentials match, sending a RADIUS-access accept message towards a WISP RADIUS proxy (22) that sends a login accept message to said user terminal (40).
2. The method of claim 1, wherein the SIM-authentication procedure adhere to the EAP-SIM procedure.
3. The method of claim 1 or 2, wherein the back-authentication is performed by a Universal Access Method, UAM.
4. The method of any preceding claim, wherein the temporary credentials are of the form: usr=IMSI@MobileOperator.com/pw=f(MSK), where usr is the username, IMSI is the International Mobile Subscriber Identity and the MobileOperator.com is the realm part of the mobile operator, pw is the password, and MSK is the Master Session Key and f(MSK) denotes some function to derive a syntactically correct password from the MSK.
5. The method of any preceding claim, wherein said WISP RADIUS proxy (22) inspects the realm part of said username.
6. The method of any preceding claim, wherein unused credentials will be automatically removed from the local database (35).
7. A system for SIM-based authentication over access networks (20, 30) not supporting the security protocol 802. Ix, said system comprising a WISP network (20) communicatively connected to a mobile operator network (30) by means of a routers (24, 34), characterised by:
- a user terminal (40) configured to perform SIM-authentication, whereby said user terminal (40) is configured to, via said WISP network (20), authenticate towards an EAP-SIM server (31) comprised in said mobile operator network (30), and - a mobile operator server OSC+ (33) configured to extract information used to derive temporarily credentials, e.g. Master Session Key, MSK, and Chargeable User ID, CUID, parameters, from an access accept message emanating from said EAP-SIM server (31); configured to store these as usemamc/password in a local database (35); and in that: - said user terminal (40) further being configured to derive temporary credentials (username/password) from information stored on a SIM-card, configured for back-authentication, whereby said user terminal (40) is configured to perform a login towards a WISP access server (23) using said username/password, and whereby said WISP access server (23) is configured to forward an access request and said username/password to said mobile operator server OSC+ (33); and in that:
- said mobile operator server OSC+ (33) further being configured to match said forwarded username/password with the temporary account stored in said local database (35), and if credentials match, configured to send a RADIUS-access accept message towards a WISP RADIUS proxy (22) that is configured to send a login accept message to said user terminal (40).
8. The system of claim 7, wherein the SIM-authentication procedure adhere to the EAP-SIM procedure.
9. The system of claim 7 or 8, wherein said back-authentication is configured to be performed by a Universal Access Method, UAM.
10. The system of any of the claims 7 - 9, wherein said temporary credentials arc configured to be of the form: usr=ISMI@MobileOperator.com/pw=fi(MSK), where usr is the username, IMSI is the International Mobile Subscriber Identity the MobileOperator.com is the web address of the mobile operator, pw is the password, and MSK is the Master Session Key, and f(MSK) denotes some function to derive a valid password from the MSK.
11. The system of any of the claims 7 - 10, wherein said WISP RADIUS proxy (22) is configured to inspect the realm part of the username/password.
12. The system of any of the claims 7 - 11, wherein said mobile operator server OSC+ (33) is configured to automatically remove unused credentials from said local database (35).
PCT/EP2005/053443 2004-08-02 2005-07-18 Sim-based authentication WO2006013150A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP04445080A EP1624639B1 (en) 2004-08-02 2004-08-02 Sim-based authentication
EP04445080.7 2004-08-02
US52203204A 2004-08-05 2004-08-05
US60/522,032 2004-08-05

Publications (1)

Publication Number Publication Date
WO2006013150A1 true WO2006013150A1 (en) 2006-02-09

Family

ID=35149213

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2005/053443 WO2006013150A1 (en) 2004-08-02 2005-07-18 Sim-based authentication

Country Status (1)

Country Link
WO (1) WO2006013150A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100934309B1 (en) 2007-12-05 2009-12-29 유비벨록스(주) Integrated Subscriber Authentication System and Subscriber Authentication Method Using the Same
WO2012172533A1 (en) * 2011-06-16 2012-12-20 Accuris Technologies Limited A device authentication method and devices
GB2498531A (en) * 2012-01-18 2013-07-24 Renesas Mobile Corp Network access using credentials stored on a virtual SIM
WO2014084760A1 (en) * 2012-11-27 2014-06-05 Telefonaktiebolaget Lm Ericsson (Publ) System for handling access by wireless devices in wi-fi network
CN104717224A (en) * 2015-03-27 2015-06-17 北京圣世博泰科技股份有限公司 Login method and device
US9270700B2 (en) 2008-12-12 2016-02-23 Microsoft Technology Licensing, Llc Security protocols for mobile operator networks
CN106954216A (en) * 2017-04-28 2017-07-14 北京北信源软件股份有限公司 Authentication method and system based on 802.1X agreements
WO2019027615A1 (en) * 2017-07-31 2019-02-07 Qualcomm Incorporated Public wireless internet service (wisp) with authentication supported by mobile network operator (mno)
CN112423299A (en) * 2020-04-16 2021-02-26 岭博科技(北京)有限公司 Method and system for wireless access based on identity authentication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003094438A1 (en) * 2002-05-01 2003-11-13 Telefonaktiebolaget Lm Ericsson (Publ) System, apparatus and method for sim-based authentication and encryption in wireless local area network access
WO2004097590A2 (en) * 2003-04-29 2004-11-11 Azaire Networks Inc. Method and system for providing sim-based roaming over existing wlan public access infrastructure

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003094438A1 (en) * 2002-05-01 2003-11-13 Telefonaktiebolaget Lm Ericsson (Publ) System, apparatus and method for sim-based authentication and encryption in wireless local area network access
WO2004097590A2 (en) * 2003-04-29 2004-11-11 Azaire Networks Inc. Method and system for providing sim-based roaming over existing wlan public access infrastructure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ALA-LAURILA J ET AL: "WIRELESS LAN ACCESS NETWORK ARCHITECTURE FOR MOBILE OPERATORS", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER. PISCATAWAY, N.J, US, vol. 39, no. 11, November 2001 (2001-11-01), pages 82 - 89, XP001107810, ISSN: 0163-6804 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100934309B1 (en) 2007-12-05 2009-12-29 유비벨록스(주) Integrated Subscriber Authentication System and Subscriber Authentication Method Using the Same
US9270700B2 (en) 2008-12-12 2016-02-23 Microsoft Technology Licensing, Llc Security protocols for mobile operator networks
US9288671B2 (en) 2011-06-16 2016-03-15 Accuris Technologies Limited Device authentication method and devices
WO2012172533A1 (en) * 2011-06-16 2012-12-20 Accuris Technologies Limited A device authentication method and devices
GB2498531A (en) * 2012-01-18 2013-07-24 Renesas Mobile Corp Network access using credentials stored on a virtual SIM
US8594631B2 (en) 2012-01-18 2013-11-26 Renesas Mobile Corporation Method and apparatus for network access
USRE45363E1 (en) 2012-01-18 2015-02-03 Broadcom Corporation Method and apparatus for network access
WO2014084760A1 (en) * 2012-11-27 2014-06-05 Telefonaktiebolaget Lm Ericsson (Publ) System for handling access by wireless devices in wi-fi network
CN104717224A (en) * 2015-03-27 2015-06-17 北京圣世博泰科技股份有限公司 Login method and device
CN104717224B (en) * 2015-03-27 2018-06-19 北京圣世博泰科技股份有限公司 A kind of login method and device
CN106954216A (en) * 2017-04-28 2017-07-14 北京北信源软件股份有限公司 Authentication method and system based on 802.1X agreements
CN106954216B (en) * 2017-04-28 2020-07-14 北京北信源软件股份有限公司 Authentication method and system based on 802.1X protocol
WO2019027615A1 (en) * 2017-07-31 2019-02-07 Qualcomm Incorporated Public wireless internet service (wisp) with authentication supported by mobile network operator (mno)
CN112423299A (en) * 2020-04-16 2021-02-26 岭博科技(北京)有限公司 Method and system for wireless access based on identity authentication
CN112423299B (en) * 2020-04-16 2023-11-24 岭博科技(北京)有限公司 Method and system for wireless access based on identity authentication

Similar Documents

Publication Publication Date Title
EP1502388B1 (en) System, apparatus and method for SIM-based authentification and encryption in wireless local area network access
EP1770940B1 (en) Method and apparatus for establishing a communication between a mobile device and a network
Koien et al. Security aspects of 3G-WLAN interworking
CA2518032C (en) Methods and software program product for mutual authentication in a communications network
US20050114680A1 (en) Method and system for providing SIM-based roaming over existing WLAN public access infrastructure
RU2304856C2 (en) Method and system, meant for setting up a connection via access network
US7774828B2 (en) Methods for common authentication and authorization across independent networks
EP2027666B1 (en) Access to services in a telecommunications network
EP2087689B1 (en) Authentication in mobile interworking system
US20060155822A1 (en) System and method for wireless access to an application server
US20060002351A1 (en) IP address assignment in a telecommunications network using the protocol for carrying authentication for network access (PANA)
WO2006013150A1 (en) Sim-based authentication
WO2006024969A1 (en) Wireless local area network authentication method
WO2007019771A1 (en) An access control method of the user altering the visited network, the unit and the system thereof
WO2012068462A2 (en) Method of and system for extending the wispr authentication procedure
US20130104207A1 (en) Method of Connecting a Mobile Station to a Communcations Network
EP1624639B1 (en) Sim-based authentication
WO2006003631A1 (en) Domain name system (dns) ip address distribution in a telecommunications network using the protocol for carrying authentication for network access (pana)
RU2292648C2 (en) System, device, and method designed for sim based authentication and for encryption with wireless local area network access
KR101025083B1 (en) Method for identifying authentication function in extensible authentication protocol
Jiang et al. WLAN-centric authentication in integrated GPRS-WLAN networks
GB2417856A (en) Wireless LAN Cellular Gateways
Živković et al. Authentication across heterogeneous networks
El-Sadek et al. Universal mobility with global identity (UMGI) architecture
Mizikovsky et al. CDMA 1x EV-DO security

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase