METHOD AND DEVICE FOR AUTHENTICATING MS THAT HAS NON R-UIM BY USING CAVE ALGORITHM
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to the Code Division Multiple Access 2000 (hereinafter referred to as cdmacdma2000) and High Rate Packet Data (hereinafter referred to as HRPD) dual-mode terminals, especially to a method and device for authenticating mobile station with non Removable User Identity Module (hereinafter referred to as R-UIM) by using Cellular Authentication and Voice Encryption (hereinafter referred to as C AVE) algorithm.
2. Description of the Related Art
The cdmacdma2000 network has been widely applied commercially all over the world. In this kind of network, a Challenge Handshake Authentication Protocol (hereinafter referred to as CHAP) based on the CAVE algorithm has been adopted to verify the legitimacy of the access terminals. This authentication system has perfect methods on illegal attack-protecting. A Mobile Station's (hereinafter referred to as MS) privacy key (A-key) and the CAVE algorithm are stored in the MS and the cdma2000 network's Authentication Centre (hereinafter referred to as AuC) respectively. The authentication process mainly includes such two procedures as the update of Shared Secret Data (SSD) and the implementation of authentication. Part A of the Shared Secret Data (SSD_A) is used for access authentication. According to specific conditions, the network sends a message including a segment of random numbers to the MS and the AuC respectively to update the SSD_A data. After this message is received by the MS and the AuC respectively, the included random numbers, the A-key and other parameters are together input into the "SSD_GENEREATION PROCEDURE" to generate an SSD_A through calculation. After confirming the correctness, the old SSD_A is replaced with the new one which will be used as the key for the access authentication. When an authentication is needed to be done on a terminal, the network sends an authentication request message to the MS and the AuC, including a segment of random numbers. After this message is received by the MS and the AuC respectively, the authentication results are calculated in the MS and the AuC by the random numbers included in said message, the SSD_A and
other parameters according to the CAVE algorithm. The MS sends the authentication result to the AuC. By comparing the differences between the authentication results, the MS can be authenticated to be valid or not. In cdma 2000 network's practice, the A-key can be stored in two modes. One is that it is stored in the MS, and the corresponding CAVE algorithm is also implemented in the MS and in this case, the MS has no an R-UIM. The other is that the A-key is stored in an R-UIM, and the corresponding CAVE algorithm is also implemented in the R-UIM card. In this case, the MS is called a MS has an R-UIM. Currently the most cdma2000 operaotrs in the counters other than China adopt the MS has an R-UIM. High Rate Packet Data (hereinafter referred to as HRPD) network is an upgrade of cdma2000 network and has been gradually adopted in commercial application all over the world. In the existing HRPD networks the terminal (similar with the MS in cdma2000) has no an R-UIM. As prescribed in the corresponding standard of the 3 G Partnership Project 2 (hereinafter referred to as 3GPP2), if the access authentication is adopted by the HRPD network, the authentication mode should also be the CHAP authentication, but no detailed encryption algorithm is specified explicitly, which can be specified by the particular operator. Both HRPD network and the cdma2000 network are independent of each other, and no information exchanges between them. The subscribers can share the services through the dual-mode terminals that support both the cdma2000 network and the HRPD network, and this category of subscriber is the main cluster of HRPD network subscribers. In the following sections, except specifically pointed out, the dual-mode terminals refer to the cdma2000/HRPD ones. At present, the operations carried out by the R-UIM card mainly includes
SSD management, authentication calculation and so on.The SSD is used for the calculations of all authentication and the generation of the subsequent privacy keys. The SSD is derived from the "A-key" in the R-UIM card. When the network sends an UPDATE SSD command (which contains a RANDSSD parameter), the SSD update process starts. The network that the relevant subscriber belongs to is the unique entity to update the subscriber's SSD, as shown in figure 3. When the network initiates an SSD update process to a certain subscriber, the subscriber's MS firstly stores a RANDSSD parameter and then generates a random number RANDSeed. The MS transfers the RANDSeed parameter to the R-UIM card and starts to perform the Base Station Challenge function. Then, the R-UIM card generates a RANDBS parameter. The relationship between the RANDBS and the RANDSeed is prescribed by the distributor of the R-UIM card. For instance, in the R-UIM card, the RANDBS can be set to equal to the RANDSeed. The
RANDBS parameter can be derived by implementing the pseudorandom process to the RANDSeed, or generated individually without respect to the RANDSeed. A Base Station Challenge command cause the R-UIM card to transmit the RANDBS parameter to the MS and in turn to the network. In succession, the MS implements the SSD update process.The RANDSSD parameter is used in this process to generate a new SSD value and an AUTHBS that is used to verify the result of the base station query.
In the network side, the RANDSSD parameter is used to generate a new SSD value. After receiving the RANDBS parameter from the MS, the network calculates the AUTHBS with the new SSD, and then sends the AUTHBS to the MS. The MS regards the received AUTHBS as the parameter of the Confirm SSD command. The MS compares the received AUTHBS with that calculated by itself, and if they are just the same, the SSD update process succeeds, then the SSD will be used in after coming authentication calculations. If the two AUTHBS values are different, the MS discards the new SSD but remians the original one.
The authentication process is the process of a terminal's legitimacy verification. Its basic operations are illustrated in figure 3( The interactive messages between MS and AuC are transmitted via radio network, But the radio network is omitted in this figure for easy description): The AuC sends a Chap Challenge message to an MS, including a 32-bit long random number RAND. The MS takes the RAND and the SSD_A as the inputs of the CAVE algorithm to calculate an 18-bit long authentication parameter 1, then the MS sends this parameterl to the AuC by an Authentication Challenge Response message, and the AuC compares the authentication parameterl with the parameter2 calculated by itself with the same method. If they are just the same, the authentication passes, otherwise, the MS is rejected to access the network.
(2) The message flow of the existing HRPD network on access authentication The HRPD network's access authentication includes the following message flow(as shown in figure 4): an access network (AN) sends the Chap Challenge message to an access terminal(AT), including the random number "Random text"; 401
The access terminal receives the Chap Challenge message, and then calculates the authentication parameter 1 with the received Random text. In the figure, the encryption algorithm MD5 is taken as an example because MD5 has been used in the existing HRPD network. Although CAVE algorithm is used in
encryption in present invention, the message flow is same as the situation when MD5 algorithm is used in encryption; 402
The terminal sends a Chap Response message to the AN, including information of AT's Network Access ID (NAI), random text, the authentication parameter 1 and so on; 403
After receiving the Chap Response message from the AT, the AN sends a Radius Access Request message to AN-AAA, including the three parameters included in the Chap Response message; 404
The AN-AAA regards the Random text and the local Password (AN-AAA Password and the AT's Password are just the same) as input value to calculate the authentication parameter 2 using the MD5 algorithm; 405
The AN-AAA compares the authentication parameter 1 with the authentication parameter 2; 406
If they are equal to, The AN-AAA sends a Radius Access Accept message to the AN, indicating that the authentication passes; 407
If the authentication parameter 1 is not the same as the authentication parameter 2, the AN-AAA sends a Radius Access Reject message to the AN to reject the access of the terminal; 408
After receiving the Radius Access Accept message, the AN sends a Chap Success message to the terminal, indicating that the authentication process is successful; 409
And after receiving the Radius Access Reject message, the AN sends the Chap Failure message to AT, indicating that the authentication process failure. 410 In practice, the voice service is normally provided by means of the cdma2000 network and the high rate data service is normally provided by means of the HRPD network. Therefore, the dual-mode terminals that support not only the cdma2000 network but also the HRPD network will take up a sizable share. Because the cdma2000 network is generally established ahead of the HRPD network, some subscribers of the HRPD network are upgraded from that of the cdma2000 network.
However, because the different access authentication algorithms are respectively used in cdma2000 network and HRPD network, operators need to manage two types passwords and the related subscriber information. And terminals also need to support two types authentication algorithms and save two passwords. That will not only bring inconvenience in the management of operators but also increase the additional complexity of terminal.
Therefore, as the cdma2000 network has been launched into operation and holds a lot of subscribers, how to realize the HRDP network's access authentication by reusing the CAVE algorithm has been used in cdma2000 network is a challenge to the HRPD network construction.
SUMMARY OF THE INVENTION
An object of the present invention is to provide a cdma2000/HRPD dual-mode terminal has non R-UIM card. The terminal can reuse the CAVE algorithm has been used in the cdma2000 network in terminals' HRPD network access authentication.
According to one side of present invention, a method for authenticating a mobile station has non R-UIM in the cdma2000 network access authentication by using a CAVE as an authentication algorithm with a character that it also can be used in HRPD network access authentication comprising steps of:
After receiving Chap Challenge message, the authentication module work out the readom number RAND to be used in the counting of Authentication parameter 1 using the "Random text" in Chap Challenge message;
The authentication module works out Authentication parameter 1 using said random number RAND and the existing part IMSI_S1 and SSD_A,etc;
The core chip bearing the authentication parameter 1 by a Result domain of a Chap Response message.
According to the other side of present invention, a device for authenticating a mobile station has non R-UIM by using a CAVE as an authentication algorithm including an antenna, a radio module, a memory, a Liquid Crystal Display, a keyboard and a battery module, with the character also including:
A core chip including cdma2000 core chip and HRPD core chip that are respectively used in the encoding to the receiving authentication messages;
A authentication module that supports CAVE algorithm. It implements CAVE algorithm by using the authentication parameter sent by core chip and the saved authentication parameters and response the implementing result to core chip.
The present invention is adapted to address the problem that no cdma2000/HRPD dual-mode terminal has non R-UIM that can support uniform althentication algorithem is in service by far. With the present invention, the problem that cdma2000 network and HRPD network respectively use different authentication algorithm can be well settled. The present invention by unifying the access authentication algorithms of the two network as CAVE algorithm bring
the convenience to the operators that operate both cdma2000 network and HRPD network and also can decrease the development cost of terminal.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 shows a hardware structure of the cdma2000/HRPD dual-mode terminal has non R TJIM that utilizes the CAVE as the access authentication algorithm;
Figure 2 illustrates a flow chart of authentication in the HRPD network performed by the dual-mode terminal according to the present invention; Figure 3 illustrates a CAVE authentication process;
Figure 4 shows an access authentication message flow that 3GPP2 defines for the HRPD network; and
Figure 5 shows an implementation of the authentication of the dual-mode terminal according to the present invention in the HRPD network.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The main object of the present invention is to realize the cdma2000/HRPD dual-mode terminal with the features that CAVE algorithm is used in both cdma2000 network access authentication and HRPD network access authentication and no modification is needed to be done to the HPRD network authentication flow. In general, with the present solution, marked benefits will be gained at very little cost. The present invention is based on the following facts: by far, the cdma2000/HRPD dual-mode terminals that can supports uniform algorithm are starved for on sale. Operators need this type terminals to bring advantage in the operation and decrease the cost of terminals.
The main idea of the present invention is to realize the dual-mode terminals can support the two networks' access authentication with a uniform authentication algorithm, by processing the parameters carried by the message flow of the HRPD network and in virtue of the SSD update result of the cdma2000 network. Thus, the problems above can be well settled.
To enable the dual-mode terminal to bear the characteristics of supporting both the two networks' access authentication by a uniform algorithm, the following basic functions should be implemented by each part of the dual-mode terminal has non R-UIM: Antenna 101
It is used for receiving and transmitting radio signals.
Radio module 102
It takes charge of the tasks such as the conversion between baseband digital signals and RF analog signals, the transmission and receiving of the RF analog signals, etc.. cdma2000 core chip 103
It is the master processing unit with the functions including the cdma2000 service data's coding and decoding, the physical channels' spectrum spreading and de-spreading, modulating and demodulating. In addition, the dual-mode chip implements tasks such as provision of a run platform for the software in the application layer of the terminal, bearing the application software modules, transmitting, receiving and processing on-the-air interface signaling, controlling a paging process and so on. It controls every relevant module in the terminal so as to make them work cooperatively. HRPD core chiplO4
In practice, it shares the same entity with the cdma2000 core chip physically, but it performs the function of HRPD network's processing of data and signaling. The software modules that bears correspond to the HRPD network.
Authentication module that supports the CAVE algorithm 105 The authentication module is used for storing the user's identity information and other network parameters, etc.. It supports the authentication based on the CAVE algorithm. In practice, and it can shares the same entity with the cdma2000/HRPD core chip physically.
Memory 106 It is data memory module in the terminal and stores the data necessary to the terminal's normal operation.
LCD 107
Information display unit
Keyboard 108 It is used for information input. Together with the LCD, it completes the interface function that the user interacts with the terminal.
Battery module 109
Provides every module with power supply.
In addition, such units as a microphone, a headphone and so on should be served for the terminal.
During a normal voice call process, the user sends instructions to the cdma2000 core chip (103) or the HRPD core chip (104) through the man-machine interface made up of the keyboard (108) and the LCD (107) to initiate a call.
After receiving the user's instructions, the core chip constructs a signalling message with the help of the CAVE-supported authentication module (105) and the memory module (106) to complete the establishment of the call cooperatively with the network and notifies the user via the LCD (107). Then, the user can start the phone call and it's voice is sent to the core chip through the microphone and coded and modulated here. Then it is transmitted to the network. Meanwhile, the core chip demodulates and decodes the received radio channel frames and sends them to the headphone. During this process, as the core chip's peripherals, the radio module (102), the memory module (106) and the battery module (109) provide necessary support to the core chip.
As for the authentication process based on the CAVE algorithm, following main modules are involved: the cdma2000/HRPD dual-mode chip (103, 104) and the authentication module (105) that supports the CAVE algorithm. The core chip decodes the received authentication message and transfers the necessary parameters to authentication module (105) to the process. After authentication module (105) receiving the authentication parameters transferred from the core chip, it carries out the calculation based on CAVE algorithm with the stored authentication information and then returns the calculation result to the core chip. After receiving the calculation result from authentication module (105), the core chip constructs the corresponding message according to the result and transmits it to the cellular network. During this process, the support from the Radio module (102), the memory (106) and the battery module (109) is also necessary for the core chip.
To support the HRPD network authentication, following new functions should be performed by the dual-mode terminal: 1. Utilization of the Chap Challenge message
The Chap Challenge message is sent from the AN to the dual-mode terminals, carrying the random number "Random text". Having been processed, this random number can be used as the random number necessary to the CAVE algorithm. The Random text is a character string presented by octets, and it is longer than the random number necessary to the CAVE authentication. It is necessary to convert the octets groups into binary format and extract the random number necessary to the CAVE authentication. As for the random number required for the CAVE authentication, consistency must be kept between the dual-mode terminals and the AN-AAA. The operation of generating the random number necessary to the CAVE authentication is implemented inside the core chip. In practice, the terminal's antenna receives the signal from the network and transfers it to the radio module. The radio module processes the signal, i.e., completes the
conversion between the baseband digital signal and the RF analog signal, etc., and transfers the processed signal to the master processing chip. The master processing chip identifies and processes the Chap Challenge message. The functions of the antenna part and the radio module are not illustrated in the corresponding figure.
2. The authentication module to carry out the authentication calculation.
Using the random number, the IMSI_S1 (part of the IMSI) and the SSD_A as input parameters, the authentication module implements the authentication calculation and generates the authentication result parameterl . 3. Storage of the NAI value
NAI value is the username used in the HRPD network. It should be stored in the memory module in advance.
4. Generation of the Chap Response message
The Chap Response message is the response of the dual-mode terminal to the Chap Challenge message from the AN. The core chip constructs the Chap
Response message with the NAI (which is obtained through the approach described above) and the authentication parameterl (which has been written into the Result domain). The other parameters are filled in the Chap Response message according to the specifications of IETF RFC1994, PPP Challenge Handshake Authentication Protocol (CHAP), Aug 1996.
5. Transmission of the Chap Response message
The core chip transmits the Chap Response message to the network through the radio module and the antenna. The functions of the antenna and the radio module parts are not illustrated in the corresponding figure. Figure 2 illustrates the flow chart of the authentication in the HRPD network performed by the dual-mode terminal according to the present invention, and the steps will be explained in more detail.
The access network sends the Chap Challenge message, i.e., the Challenge Handshake Authentication Protocol Challenge message to the access terminal, including the "Random text"; 201
The authentication module of the access terminal extracts 32 bits from the Random text as the random number RAND for the authentication process and sends it to the R-UIM card; 202
The authentication module calculates the authentication result parameter 1 through the CAVE algorithm with the SSD_A, the RAND and other parameters and sends them to the access terminal; 203
The access terminal reads out the NAI from the memory module; 204
The access terminal writes the NAI into the corresponding domain of the Chap Response message, i.e., the Challenge Handshake Authentication Protocol Response message, and writes the authentication parameter 1 into the Result domain of this message, then transmits this Chap Response message to the access network; 205
If the authentication is successful, the access network will send an Authentication Success message to the access terminal; 206
And if the authentication fails, the access network will send an Authentication Failure message to the access terminal; 207