WO2008034360A1 - Procédé d'authentification et d'autorisation d'accès au réseau et procédé de mise à jour de clé d'autorisation - Google Patents
Procédé d'authentification et d'autorisation d'accès au réseau et procédé de mise à jour de clé d'autorisation Download PDFInfo
- Publication number
- WO2008034360A1 WO2008034360A1 PCT/CN2007/070299 CN2007070299W WO2008034360A1 WO 2008034360 A1 WO2008034360 A1 WO 2008034360A1 CN 2007070299 W CN2007070299 W CN 2007070299W WO 2008034360 A1 WO2008034360 A1 WO 2008034360A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authorization
- mobile terminal
- base station
- access
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Definitions
- the invention provides a network access authentication and authorization method and an authorization key update method.
- the application is submitted to the Chinese Patent Office on September 23, 2006, and the application number is 200610104678.X, and the invention name is "a network access authentication and authorization method".
- the priority of the Chinese Patent Application which is incorporated herein by reference.
- the invention relates to a network access authentication and authorization method and an authorization key update method, which are specifically applicable to a wired network and a wireless network such as a wireless local area network (WLAN), a wireless metropolitan area network (WMAN), a broadband wireless multimedia (BWM) network, and the like.
- WLAN wireless local area network
- WMAN wireless metropolitan area network
- BWM broadband wireless multimedia
- Wireless network security issues are far more important than wired Ethernet.
- the IEEE Institute of Electrical and Electronics Engineers
- 802.11 and 802.16 series standards to enhance the security of wireless LANs and wireless metropolitan area networks, providing secure access from mobile terminals to base stations. China also promulgated wireless LANs in May 2003.
- the national standard GB15629.il commonly referred to as the WAPI (Wireless Local Area Network Authentication and Privacy Infrastructure) protocol.
- Broadband wireless multimedia networks combine data communication and broadcast communication. They are a new wireless network architecture that faces security issues such as secure access and authentication and authorization.
- the US IEEE802.i l standard implements the security of wireless LAN through the WEP (Wired Equivalent Privacy) protocol. Both theory and application prove that the WEP protocol has serious security vulnerabilities.
- WEP Wired Equivalent Privacy
- the US IEEE has supplemented the 802.11i standard to solve WEP security vulnerabilities, the 802.lli standard itself has the following drawbacks: Direct identification of mobile terminals and access points cannot be achieved, that is, the 802.11i standard only implements mobile terminals and The two-way authentication between the authentication servers does not enable direct identity authentication between the mobile terminal and the access point, and other security protocols are needed to improve security. For example, a secure channel needs to be established between the access point and the authentication server by means of other security protocols.
- Each access point must establish a secure channel with the background authentication server in advance, and this secure channel generally needs to be manually established, which is not conducive to system expansion.
- the security is less reliable, that is, since each access point establishes a secure channel with the authentication server, the security of the channel affects the entire network system.
- the wireless metropolitan area network standard proposed by the IEEE in the United States is the IEEE 802.16 standard, which can solve the authentication problem of the mobile terminal and the base station, but cannot prevent the attacker from posing as a base station to spoof the mobile terminal. Since the authorization key is only protected by the public key encryption of the mobile terminal, anyone can forge such a packet without being discovered.
- the IEEE802.16e standard improves the scheme by reference to the IEEE802.il i standard, but still cannot achieve mobile end.
- Direct identity authentication between the terminal and the base station In addition, a secure channel needs to be established in advance between the base station and the authentication server, and other security protocols are required.
- the key management uses the time synchronization method, and the state management is complicated. That is, the enabling and disabling of the new key depends on the time judgment, and maintaining the synchronous clock in a distributed system is complicated. The system has many states and the management is complicated.
- China's national standard GB15629.il overcomes some of the shortcomings of the WEP protocol, but it also has the following shortcomings: It only provides two-way identity authentication for mobile terminals and access points, and does not support one-way authentication of access points to mobile terminals, which cannot satisfy only Application requirements requiring one-way authentication. For example: In a broadband wireless multimedia network, in addition to supporting two-way authentication between a base station and a mobile terminal, it is also necessary to support one-way authentication of the mobile terminal by the base station. In addition, the key negotiation process requires a large number of exponential operations, which not only increases the computational burden of the device, but also has a large impact on system performance.
- the invention provides a network access authentication and authorization method and a matching authorization key update method thereof, which can solve the problem that the direct identity authentication between the mobile terminal and the base station cannot be realized in the background art, and other security protocols need to be provided, and only the mobile terminal is provided.
- the two-way identity authentication with the base station does not support the technical problem of the base station's one-way authentication to the mobile terminal.
- a method for network access authentication and authorization comprising:
- the mobile terminal When the mobile terminal is physically associated with the base station, the mobile terminal constructs an access and authorization request packet, and sends the access and authorization request packet to the base station;
- the base station After receiving the access and authorization request packet, the base station constructs a certificate authentication request packet, and sends the certificate authentication request packet to the authentication server;
- the authentication server After receiving the certificate authentication request packet, the authentication server authenticates the validity of the mobile terminal certificate, or authenticates the validity of the mobile terminal certificate and the base station certificate, constructs a certificate authentication response packet according to the authentication result, and Sending the certificate authentication response packet to the base station;
- the base station After receiving the certificate authentication response packet, the base station constructs an access and authorization response packet and sends the packet to the mobile terminal;
- the mobile terminal After receiving the access and authorization response packet, the mobile terminal uses the plaintext of the authorization key material AKM decrypted by its own private key, and derives the authorization key AK by using the random number selected by the mobile terminal and the base station.
- the authorization key AK derives the key encryption key and the integrity check key, and constructs Incoming and authorizing the acknowledgment packet, and transmitting the access and authorization acknowledgment packet to the base station.
- the content of the foregoing access and authorization request packet includes: an identifier field Flag, an identity ID MS of the mobile terminal, a digital certificate Cert MS of the mobile terminal, an authorization key identifier AKID, and a random number N MS selected by the mobile terminal MS ;
- the content of the above certificate authentication request packet includes: an identifier field Flag, a digital certificate of the mobile terminal
- the mobile terminal select a random number N MS MS and BS selected by the random number N BS, wherein the Flag field values with the same access and authorization request packet identification field value, the selected mobile terminal MS
- the value of the random number N MS should be the same as the corresponding field in the access and authorization request packet;
- the contents of the above certificate authentication response packet include: an identifier field Flag, a digital certificate of the mobile terminal
- the mobile terminal select a random number N MS MS, BS selected by a random number N BS and an authentication server for the packet digital signature Sig ASU, wherein Flag field value of the certificate should be the same identification field value of the authentication request packet, the mobile terminal select a random number N MS MS and BS selected by the random number value of N should be the same BS certificate authentication request corresponding field;
- the content of the foregoing access and authorization response packet includes: an identifier field Flag, an identity ID MS of the mobile terminal, an identity ID BS of the base station, a digital certificate Cert MS of the mobile terminal and a result of the authentication Result MS , a signature of the authentication server, a Si gASU , a base station A series of security associations SAs authorized by the mobile terminal, an authorization key identifier AKID, a ciphertext E MS (AKM) of the 4 authorized key material AKM selected by the base station and encrypted by the mobile terminal public key, an expiration date of the authorization key LifeAK, the value selected mobile terminal MS and the random number N MS BS selected by the random number N BS, wherein the value of the Flag field should be the same as the access and authorization identifier field value in the request packet, the authorization key identifier AKID Same as the authorization key identifier AKID in the access and authorization request packet;
- the content of the foregoing access and authorization confirmation packet includes: an identifier field Flag, an identity ID MS of the mobile terminal, an identity ID BS of the base station, an authorization key identifier AKID, a random number N BS selected by the base station BS, and a message integrity check code MIC
- the value of the identifier field Flag is the same as the value of the identifier field in the access and authorization request packet, and the value of the random number N BS selected by the base station BS should be the same as the value of the corresponding field in the access and authorization response packet.
- the message integrity check code MIC is calculated by the integrity key derived from the authorization key AK corresponding to the authorization key identifier AKID, and the authorization key AK is Authorization key material AKM, the mobile terminal select a random number N MS MS and BS selected by the random number N BS common export.
- the content of the certificate authentication request packet further includes: the ciphertext E of the authorization key material AKM selected by the base station and encrypted by the public key of the mobile terminal.
- MS (AKM)
- the content of the certificate authentication response packet further includes: a ciphertext E MS (AKM) of the authorization key material AKM selected by the base station and encrypted by the public key of the mobile terminal.
- the content of the access and authorization response packet further includes: a message integrity check code MIC, and the integrity of the message integrity check code MIC is determined by the authorization key AKID corresponding to the authorization key AK. key calculation, the authorization key AK AKM, the mobile terminal select a random number N MS MS and BS selected by a random number derived by a common BS N authorization key material.
- the content of the certificate authentication request packet further includes: a digital certificate Cert BS of the base station and a digital signature Sig BS of all previous fields of the base station;
- the content of the response packet further includes: a digital certificate Cert BS of the base station and an authentication result Result BS ;
- the content of the access and authorization response packet further includes: a digital certificate Cert BS of the base station and a result Result BS thereof The digital signature of the base station Sig BS .
- An authorization key update method matching the foregoing network access authentication and authorization method comprising: when performing an authorization key update, the mobile terminal constructs an access and authorization request packet, and groups the access and authorization request Sent to the base station;
- the base station After receiving the access and authorization request packet, the base station determines, by using the Flag field in the access and authorization request packet, an authorization key update request, and constructs an access and authorization response packet according to the last certificate authentication result. And transmitting the access and authorization response packet to the mobile terminal;
- the mobile terminal After receiving the access and authorization response packet, the mobile terminal uses the plaintext of the authorization key material AKM decrypted by its own private key, and derives the authorization key AK by using the random number selected by the mobile terminal and the base station.
- the authorization key AK derives a key encryption key and an integrity check key, constructs an access and authorization confirmation packet, and transmits the access and authorization confirmation packet to the base station.
- the content of the foregoing access and authorization request packet includes: an identifier field Flag, an identity ID MS of the mobile terminal, an authorization key identifier AKID, a random number N MS selected by the mobile terminal MS, and a message integrity check code MIC.
- the message integrity check code MIC can protect the integrity of the message, and is calculated by using the integrity key derived by the old authorization key AK;
- the content of the foregoing access and authorization response packet includes: an identifier field Flag, an identity ID MS of the mobile terminal, an identity ID BS of the base station, an authorization key identifier AKID, an authorization key material selected by the base station and encrypted by the mobile terminal public key AKM
- the ciphertext E MS (AKM) the validity period of the authorization key LifeAK, the random number N MS selected by the mobile terminal, the random number N BS selected by the base station, and the message integrity check code MIC.
- the value of the identifier field Flag should be the same as the value of the identifier field in the access and authorization request packet.
- the value of the authorization key identifier AKID is the same as the authorization key identifier AKID in the access and authorization request packet, and message integrity.
- the check code MIC is calculated by the integrity key derived from the authorization key AK corresponding to the authorization key identifier AKID, and the authorization key AK passes the authorization key material AKM, the random number N MS selected by the mobile terminal MS, and the base station BS.
- the selected random numbers N BS are jointly derived.
- the invention solves the security problem of the mobile terminal accessing the base station in the broadband wireless multimedia network; the two-way identity authentication of the mobile terminal and the base station can be realized, and the one-way identity authentication of the mobile terminal by the base station can be realized.
- the invention also realizes direct identity authentication between the base station and the mobile terminal; the authorization key negotiation calculation is simple, and a large number of index operations are avoided.
- the key management uses a message confirmation method, which is simple and easy to implement.
- the present invention eliminates the need to establish a secure channel between the base station and the authentication server or to utilize other security protocols.
- FIG. 1 is a schematic diagram of a method for access authentication and authorization according to the present invention
- FIG. 2 is a schematic diagram of a method for updating an authorization key according to the present invention.
- the two-way authentication between the mobile terminal and the base station or the one-way authentication of the mobile terminal by the base station is completed by the authentication server, and the base station authorizes the mobile terminal according to the authentication result.
- the implementation steps of the access authentication and authorization method of the present invention are as follows:
- the mobile terminal When the mobile terminal is physically associated with the base station, the mobile terminal constructs an access and authorization request packet, and The access and authorization request packet is sent to the base station.
- the content of the access and authorization request packet includes: an identifier field Flag, an identity ID MS of the mobile terminal (MS, Mobile Station), a digital certificate Cert MS of the mobile terminal MS , an authorization key identifier AKID, and a random number N selected by the mobile terminal MS MS .
- an identifier field Flag an identity ID MS of the mobile terminal (MS, Mobile Station)
- a digital certificate Cert MS of the mobile terminal MS a digital certificate of the mobile terminal MS
- an authorization key identifier AKID an authorization key identifier
- the base station After receiving the access and authorization request packet of the mobile terminal, the base station constructs a certificate authentication request packet, and sends the certificate authentication request packet to an authentication service unit (ASU).
- ASU authentication service unit
- the contents of the certificate authentication request packet include: an identification field Flag, a digital certificate of the mobile terminal MS
- the mobile terminal select a random number N MS MS and a base station (BS, Base Station) select a random number N BS.
- the value of the identifier field Flag is the same as the value of the identifier field in the access and authorization request packet, and the value of the random number N MS selected by the mobile terminal MS should be the same as the value of the corresponding field in the access and authorization request packet.
- the content of the certificate authentication request packet further includes: a ciphertext E MS (AKM) of the authorization key material AKM selected by the base station and encrypted by the public key of the mobile terminal MS.
- ALM ciphertext E MS
- the content of the certificate authentication request packet further includes: a digital certificate Cert BS of the base station BS and a digital signature Sig BS of the base station BS for all the previous fields.
- the authentication server After receiving the certificate authentication request packet of the base station, the authentication server authenticates the validity of the mobile terminal certificate, or authenticates the validity of the mobile terminal certificate and the base station certificate. Based on the authentication result, a certificate authentication response packet is constructed, and the certificate authentication response packet is transmitted to the base station.
- Content certificate authentication response packet comprises: identification field Flag, the mobile terminal MS is a digital certificate Cert Control MS and an authentication result Result MS, the mobile terminal MS to select a random number N MS, BS selected by the BS and the random number N to the authentication server ASU The grouped digital signature Sig ASU .
- the value of Flag field should be the same as the certificate authentication request identification packet field value, the mobile terminal MS to select a random number N MS and BS selected by the random number N may be chosen to BS certificate authentication request The corresponding fields are the same.
- the identifier field Flag is identified as one-way authentication
- the content of the certificate authentication response packet further includes: a ciphertext E MS (AKM) of the authorization key material AKM selected by the base station and encrypted by the public key of the mobile terminal MS.
- ALM ciphertext E MS
- the content of the certificate authentication response packet further includes the digital certificate Cert BS of the base station BS and its authentication result Result BS .
- the base station After receiving the certificate authentication response packet of the authentication server, the base station constructs an access and authorization response packet and sends it to the mobile terminal.
- the content of the access and authorization response packet includes: an identifier field Flag, an identity ID MS of the mobile terminal MS, an identity ID BS of the base station BS , a digital certificate Cert MS of the mobile terminal MS, and an authentication result Result MS , a signature Sig of the authentication server ASU
- a series of security association SAs authorized by the ASU and the base station to the mobile terminal including a primary security association SA and multiple static security associations SA, an authorization key identifier AKID, and an authorization key material selected by the base station and encrypted by the mobile terminal MS public key.
- the ciphertext EMS (AKM) of the AKM the validity period of the authorization key LifeAK, the random number N MS selected by the mobile terminal MS, and the random number N BS selected by the base station BS .
- the value of the identifier field Flag should be the same as the value of the identifier field in the access and authorization request packet, and the value of the authorization key identifier AKID is the same as the authorization key identifier AKID in the access and authorization request packet.
- the content of the access and authorization response packet further includes a message integrity check code MIC.
- the message integrity check code MIC is calculated by the integrity key derived from the authorization key AK corresponding to the authorization key identifier AKID, and the authorization key AK is derived from the authorization key material AKM, the random number N MS selected by the mobile terminal MS, and the base station BS.
- the selected random numbers N BS are jointly derived.
- the content of the access and authorization response packet further includes the digital certificate Cert BS of the base station BS , the authentication result Result BS and the digital signature Si gBS of all the previous fields by the base station BS.
- the mobile terminal After the mobile terminal receives the access and authorization response packet of the base station, the mobile terminal uses the private key to decrypt the plaintext of the authorized key material AKM, and uses the random number selected by the mobile terminal and the base station to derive the authorization key AK, which is authorized.
- the key AK derives the key encryption key and the integrity check key, constructs an access and authorization confirmation packet, and transmits the access and authorization confirmation packet to the base station.
- the content of the access and authorization confirmation packet includes: an identifier field Flag, an identity ID MS of the mobile terminal MS, an identity ID BS of the base station BS , an authorization key identifier AKID, a random number N BS selected by the base station BS, and a message integrity check code. MIC.
- the value of the identifier field Flag is the same as the value of the identifier field in the access and authorization request packet, and the value of the random number N BS selected by the base station BS should be the same as the value of the corresponding field in the access and authorization response packet.
- the integrity check code MIC is calculated by the integrity key derived from the authorization key AK corresponding to the authorization key identifier AKID, and the authorization key AK is the random number N selected by the authorization key material AKM and the mobile terminal MS.
- the MS and the random number N BS selected by the base station BS are jointly derived.
- the implementation steps of the authorization key update method of the present invention are as follows:
- the mobile terminal constructs an access and authorization request packet, and transmits the access and authorization request packet to the base station.
- the content of the access and authorization request packet includes: an identifier field Flag, an identity ID MS of the mobile terminal MS, an authorization key identifier AKID, a random number N MS selected by the mobile terminal MS, and a message integrity check code MIC.
- the message integrity check code MIC protects the integrity of the message and is calculated using the integrity key derived from the old authorization key AK.
- the base station After receiving the access and authorization request packet of the mobile terminal, the base station determines whether it is an authorization key update request by using the Flag field in the packet, and if it is an authorization key update request, the base station constructs an access and authorization according to the last certificate authentication result. Responding to the packet and sending it to the mobile terminal;
- the content of the access and authorization response packet includes: an identifier field Flag, an identity ID MS of the mobile terminal MS, an identity ID BS of the base station BS , an authorization key identifier AKID, an authorization key selected by the base station and encrypted by the mobile terminal MS public key.
- AKM material ciphertext E MS (AKM), valid authorization key LifeAK the mobile terminal MS to select a random number N MS, BS selected by a random number N BS and a message integrity check code MIC.
- the value of the identifier field Flag should be the same as the value of the identifier field in the access and authorization request packet.
- the value of the authorization key identifier AKID is the same as the authorization key identifier AKID in the access and authorization request packet, and message integrity.
- the check code MIC is calculated by the integrity key derived by the authorization key AK corresponding to the authorization key identifier AKID, and the authorization key AK is the random number N MS selected by the authorization key material AKM and the mobile terminal MS.
- the mobile terminal After the mobile terminal receives the access and authorization response packet of the base station, the mobile terminal uses the private key to decrypt the plaintext of the authorized key material AKM, and uses the random number selected by the mobile terminal and the base station to derive the authorization key AK, which is authorized.
- the key AK derives the key encryption key and the integrity check key, constructs an access and authorization confirmation packet, and transmits the access and authorization confirmation packet to the base station.
- the network access authentication and authorization method of the present invention supports updating of an authorization key.
- one bit of the field Flag may be used to identify an initial access authentication and authorization process or an update of the authorization key.
- the key update may be performed by the initial access authentication and authorization method, or the key update may be performed by the authorization key update method.
- the key update can only be performed through the initial access authentication and authorization method.
- the security of the authorization key update method and the performance of the system are higher.
- Key management uses message confirmation mode, which is simple and easy to implement. There is no need to establish a secure channel between the base station and the authentication server or to use other security protocols.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009528582A JP5422835B2 (ja) | 2006-09-23 | 2007-07-16 | ネットワークのアクセス認証及び承認の方法、及び承認鍵のアップデート方法 |
US12/441,915 US8185091B2 (en) | 2006-09-23 | 2007-07-16 | Network access authentication and authorization method and an authorization key updating method |
EP07764226.2A EP2063567B1 (en) | 2006-09-23 | 2007-07-16 | A network access authentication and authorization method and an authorization key updating method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200610104678XA CN100488305C (zh) | 2006-09-23 | 2006-09-23 | 一种网络接入鉴别与授权方法以及授权密钥更新方法 |
CN200610104678.X | 2006-09-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008034360A1 true WO2008034360A1 (fr) | 2008-03-27 |
Family
ID=38019102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/070299 WO2008034360A1 (fr) | 2006-09-23 | 2007-07-16 | Procédé d'authentification et d'autorisation d'accès au réseau et procédé de mise à jour de clé d'autorisation |
Country Status (5)
Country | Link |
---|---|
US (1) | US8185091B2 (zh) |
EP (1) | EP2063567B1 (zh) |
JP (1) | JP5422835B2 (zh) |
CN (1) | CN100488305C (zh) |
WO (1) | WO2008034360A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867923A (zh) * | 2010-06-11 | 2010-10-20 | 西安电子科技大学 | 基于身份自证实的异构无线网络安全接入认证方法 |
JP2013503512A (ja) * | 2009-08-28 | 2013-01-31 | 西安西▲電▼捷通▲無▼綫▲網▼絡通信股▲分▼有限公司 | オンライン第三者を導入するエンティティ双方向認証方法 |
JP2013506352A (ja) * | 2009-09-30 | 2013-02-21 | 西安西▲電▼捷通▲無▼▲線▼▲網▼▲絡▼通信股▲ふん▼有限公司 | オンライン信頼できる第三者を導入したエンティティの公開鍵の取得、証明書の検証及び認証の方法及びシステム |
CN111416824A (zh) * | 2020-03-23 | 2020-07-14 | 阳光凯讯(北京)科技有限公司 | 一种网络接入认证控制系统 |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100463391C (zh) * | 2006-09-23 | 2009-02-18 | 西安西电捷通无线网络通信有限公司 | 一种网络密钥管理及会话密钥更新方法 |
CN101388883B (zh) * | 2007-09-12 | 2012-04-25 | 华为技术有限公司 | 多媒体会话中特定设备的管理方法、系统和设备 |
CN101159639B (zh) * | 2007-11-08 | 2010-05-12 | 西安西电捷通无线网络通信有限公司 | 一种单向接入认证方法 |
CN101448038B (zh) * | 2007-11-27 | 2011-07-27 | 华为技术有限公司 | 终端及操作确认的方法 |
CN101557590A (zh) * | 2008-04-07 | 2009-10-14 | 华为技术有限公司 | 一种移动终端接入网络的安全验证方法、系统和装置 |
JP4394730B1 (ja) * | 2008-06-27 | 2010-01-06 | 株式会社エヌ・ティ・ティ・ドコモ | 移動通信方法及び移動局 |
US8195817B2 (en) * | 2009-02-11 | 2012-06-05 | Sprint Communications Company L.P. | Authentication of the geographic location of wireless communication devices |
CN101521883B (zh) * | 2009-03-23 | 2011-01-19 | 中兴通讯股份有限公司 | 一种数字证书的更新和使用方法及系统 |
CN101521877B (zh) * | 2009-03-31 | 2012-05-09 | 中兴通讯股份有限公司 | 远程管理移动终端数字证书的系统和方法 |
CN101645899B (zh) * | 2009-05-27 | 2011-08-17 | 西安西电捷通无线网络通信股份有限公司 | 基于对称加密算法的双向认证方法及系统 |
CN101616410B (zh) * | 2009-06-25 | 2011-08-10 | 中兴通讯股份有限公司 | 一种蜂窝移动通信网络的接入方法和系统 |
CN101964976B (zh) * | 2009-07-21 | 2016-08-24 | 中兴通讯股份有限公司 | 终端鉴权方法以及基站 |
CN101631114B (zh) * | 2009-08-19 | 2011-09-21 | 西安西电捷通无线网络通信股份有限公司 | 一种基于公钥证书的身份鉴别方法及其系统 |
CN101645776B (zh) | 2009-08-28 | 2011-09-21 | 西安西电捷通无线网络通信股份有限公司 | 一种引入在线第三方的实体鉴别方法 |
CN102006671B (zh) * | 2009-08-31 | 2014-06-18 | 中兴通讯股份有限公司 | 一种实现来电转接的系统及方法 |
CN101729249B (zh) | 2009-12-21 | 2011-11-30 | 西安西电捷通无线网络通信股份有限公司 | 用户终端之间安全连接的建立方法及系统 |
CN101795263B (zh) * | 2009-12-28 | 2012-12-12 | 中国联合网络通信集团有限公司 | 宽带安全接入方法、认证方法和装置及系统 |
US20120008784A1 (en) * | 2010-07-08 | 2012-01-12 | Phillip Martin Hallam-Baker | Delegated Key Exchange System and Method of Operation |
CN101964950B (zh) * | 2010-11-04 | 2012-11-21 | 哈尔滨工业大学 | 基于td-lte的宽带多媒体集群系统集群调度服务器的鉴权方法 |
CN102324005A (zh) * | 2011-08-31 | 2012-01-18 | 李智虎 | 一种无计算能力终端安全认证方法、系统和装置 |
CN102404736B (zh) * | 2011-12-28 | 2014-07-02 | 西安西电捷通无线网络通信股份有限公司 | 一种wai 证书鉴别方法及装置 |
CN102571792A (zh) * | 2012-01-06 | 2012-07-11 | 西安润基投资控股有限公司 | 智能移动无线终端访问云服务器的身份认证方法 |
US9781137B2 (en) * | 2012-10-11 | 2017-10-03 | Nokia Solutions And Networks Oy | Fake base station detection with core network support |
CN103906050A (zh) * | 2012-12-30 | 2014-07-02 | 航天信息股份有限公司 | 基于移动终端的wpki安全监控方法和系统 |
CN104010303B (zh) * | 2014-05-09 | 2016-09-14 | 中国人民解放军信息工程大学 | 基于物理层密钥的终端和核心网的双向认证增强方法 |
US10080185B2 (en) * | 2015-04-10 | 2018-09-18 | Qualcomm Incorporated | Method and apparatus for securing structured proximity service codes for restricted discovery |
CN106332066A (zh) * | 2015-06-15 | 2017-01-11 | 数据通信科学技术研究所 | 移动终端间的身份认证方法及系统 |
US20180049027A1 (en) * | 2016-08-11 | 2018-02-15 | Qualcomm Incorporated | Adding authenticatable signatures to acknowledgements |
CN108418776B (zh) * | 2017-02-09 | 2021-08-20 | 上海诺基亚贝尔股份有限公司 | 用于提供安全业务的方法和设备 |
CN107835172A (zh) * | 2017-11-07 | 2018-03-23 | 中铁程科技有限责任公司 | 票据信息验证方法及系统、服务器和计算机可读存储介质 |
CN111182274A (zh) * | 2020-01-21 | 2020-05-19 | 奇点新源国际技术开发(北京)有限公司 | 一种用于视频采集系统的数据传输方法 |
CN114449513A (zh) * | 2020-10-16 | 2022-05-06 | 中移(上海)信息通信科技有限公司 | 路侧设备的鉴权方法、装置、设备及计算机存储介质 |
CN114760036A (zh) * | 2020-12-26 | 2022-07-15 | 西安西电捷通无线网络通信股份有限公司 | 一种身份鉴别方法和装置 |
CN114760043A (zh) * | 2020-12-26 | 2022-07-15 | 西安西电捷通无线网络通信股份有限公司 | 一种身份鉴别方法和装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020176583A1 (en) * | 2001-05-23 | 2002-11-28 | Daniel Buttiker | Method and token for registering users of a public-key infrastructure and registration system |
CN1588842A (zh) * | 2004-09-30 | 2005-03-02 | 西安西电捷通无线网络通信有限公司 | 一种增强无线城域网安全性的方法 |
CN1665183A (zh) * | 2005-03-23 | 2005-09-07 | 西安电子科技大学 | Wapi认证机制中的密钥协商方法 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI20000760A0 (fi) * | 2000-03-31 | 2000-03-31 | Nokia Corp | Autentikointi pakettidataverkossa |
JP2003244130A (ja) * | 2002-02-14 | 2003-08-29 | Canon Inc | 会議システム |
CN1275419C (zh) | 2002-10-18 | 2006-09-13 | 华为技术有限公司 | 一种网络安全认证方法 |
CN1191696C (zh) * | 2002-11-06 | 2005-03-02 | 西安西电捷通无线网络通信有限公司 | 一种无线局域网移动设备安全接入及数据保密通信的方法 |
US7350077B2 (en) * | 2002-11-26 | 2008-03-25 | Cisco Technology, Inc. | 802.11 using a compressed reassociation exchange to facilitate fast handoff |
JP3792648B2 (ja) * | 2002-12-25 | 2006-07-05 | 日本電気通信システム株式会社 | 無線lanの高速認証方式及び高速認証方法 |
JP2004320308A (ja) * | 2003-04-15 | 2004-11-11 | Matsushita Electric Ind Co Ltd | 暗号化通信システムおよび暗号化通信方法 |
JP4422437B2 (ja) * | 2003-06-25 | 2010-02-24 | 日本放送協会 | ライセンス情報送信装置およびライセンス情報受信装置 |
GB0315278D0 (en) * | 2003-06-30 | 2003-08-06 | Nokia Corp | A method for optimising handover between communication networks |
US8341700B2 (en) * | 2003-10-13 | 2012-12-25 | Nokia Corporation | Authentication in heterogeneous IP networks |
CN100389555C (zh) * | 2005-02-21 | 2008-05-21 | 西安西电捷通无线网络通信有限公司 | 一种适合有线和无线网络的接入认证方法 |
WO2006096017A1 (en) * | 2005-03-09 | 2006-09-14 | Electronics And Telecommunications Research Institute | Authentication method and key generating method in wireless portable internet system |
KR100704675B1 (ko) * | 2005-03-09 | 2007-04-06 | 한국전자통신연구원 | 무선 휴대 인터넷 시스템의 인증 방법 및 관련 키 생성방법 |
US7743245B2 (en) * | 2005-03-10 | 2010-06-22 | Intel Corporation | Security protocols on incompatible transports |
US20070097934A1 (en) * | 2005-11-03 | 2007-05-03 | Jesse Walker | Method and system of secured direct link set-up (DLS) for wireless networks |
US7903817B2 (en) * | 2006-03-02 | 2011-03-08 | Cisco Technology, Inc. | System and method for wireless network profile provisioning |
-
2006
- 2006-09-23 CN CNB200610104678XA patent/CN100488305C/zh not_active Expired - Fee Related
-
2007
- 2007-07-16 US US12/441,915 patent/US8185091B2/en not_active Expired - Fee Related
- 2007-07-16 EP EP07764226.2A patent/EP2063567B1/en not_active Not-in-force
- 2007-07-16 WO PCT/CN2007/070299 patent/WO2008034360A1/zh active Application Filing
- 2007-07-16 JP JP2009528582A patent/JP5422835B2/ja not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020176583A1 (en) * | 2001-05-23 | 2002-11-28 | Daniel Buttiker | Method and token for registering users of a public-key infrastructure and registration system |
CN1588842A (zh) * | 2004-09-30 | 2005-03-02 | 西安西电捷通无线网络通信有限公司 | 一种增强无线城域网安全性的方法 |
CN1665183A (zh) * | 2005-03-23 | 2005-09-07 | 西安电子科技大学 | Wapi认证机制中的密钥协商方法 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013503512A (ja) * | 2009-08-28 | 2013-01-31 | 西安西▲電▼捷通▲無▼綫▲網▼絡通信股▲分▼有限公司 | オンライン第三者を導入するエンティティ双方向認証方法 |
JP2013506352A (ja) * | 2009-09-30 | 2013-02-21 | 西安西▲電▼捷通▲無▼▲線▼▲網▼▲絡▼通信股▲ふん▼有限公司 | オンライン信頼できる第三者を導入したエンティティの公開鍵の取得、証明書の検証及び認証の方法及びシステム |
US8751792B2 (en) | 2009-09-30 | 2014-06-10 | China Iwncomm Co., Ltd. | Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party |
CN101867923A (zh) * | 2010-06-11 | 2010-10-20 | 西安电子科技大学 | 基于身份自证实的异构无线网络安全接入认证方法 |
CN111416824A (zh) * | 2020-03-23 | 2020-07-14 | 阳光凯讯(北京)科技有限公司 | 一种网络接入认证控制系统 |
CN111416824B (zh) * | 2020-03-23 | 2022-04-15 | 阳光凯讯(北京)科技有限公司 | 一种网络接入认证控制系统 |
Also Published As
Publication number | Publication date |
---|---|
CN1949709A (zh) | 2007-04-18 |
EP2063567B1 (en) | 2018-04-04 |
EP2063567A1 (en) | 2009-05-27 |
JP5422835B2 (ja) | 2014-02-19 |
US8185091B2 (en) | 2012-05-22 |
US20100009656A1 (en) | 2010-01-14 |
CN100488305C (zh) | 2009-05-13 |
JP2010504669A (ja) | 2010-02-12 |
EP2063567A4 (en) | 2014-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008034360A1 (fr) | Procédé d'authentification et d'autorisation d'accès au réseau et procédé de mise à jour de clé d'autorisation | |
US7734280B2 (en) | Method and apparatus for authentication of mobile devices | |
KR101260536B1 (ko) | 유무선 네트워크에 적합한 액세스 인증 방법 | |
US9392453B2 (en) | Authentication | |
JP3570310B2 (ja) | 無線lanシステムにおける認証方法と認証装置 | |
WO2008034362A1 (en) | Method for managing network key and updating session key | |
US9009479B2 (en) | Cryptographic techniques for a communications network | |
WO2010115326A1 (zh) | 一种无线局域网终端的预鉴别方法及无线局域网系统 | |
WO2010012203A1 (zh) | 鉴权方法、重认证方法和通信装置 | |
US8959333B2 (en) | Method and system for providing a mesh key | |
JP2003005641A (ja) | 無線lanシステムにおける認証方法と認証装置 | |
WO2011020274A1 (zh) | 一种有线局域网的安全访问控制方法及其系统 | |
WO2010108347A1 (zh) | 一种数字证书的更新和使用方法及系统 | |
WO2010127539A1 (zh) | 一种流媒体业务的接入认证方法及系统 | |
WO2010135890A1 (zh) | 基于对称加密算法的双向认证方法及系统 | |
WO2015100974A1 (zh) | 一种终端认证的方法、装置及系统 | |
CN1859098A (zh) | 在无线接入系统中实现eap认证中继的方法 | |
WO2012075825A1 (zh) | 无线局域网中端站的安全配置方法、ap、sta、as及系统 | |
JP5540111B2 (ja) | 交換デバイス間の安全な接続の構築方法及びシステム | |
CN110012467B (zh) | 窄带物联网的分组认证方法 | |
WO2010020190A1 (zh) | 一种增强广播或组播系统安全性的方法 | |
TW201119423A (en) | Method and apparatus for reducing overhead for integrity check of data in wireless communication system | |
WO2012040949A1 (zh) | 一种移动WiMAX网络中EAP认证快速切换方法 | |
WO2012113225A1 (zh) | 安全访问wapi网络的方法、装置及系统 | |
JP4071774B2 (ja) | 無線ネットワークにおける暗号鍵の配送方法および子機 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07764226 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2009528582 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12441915 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007764226 Country of ref document: EP |