WO2014007172A1 - Mobile communication method and mobile terminal - Google Patents
Mobile communication method and mobile terminal Download PDFInfo
- Publication number
- WO2014007172A1 WO2014007172A1 PCT/JP2013/067872 JP2013067872W WO2014007172A1 WO 2014007172 A1 WO2014007172 A1 WO 2014007172A1 JP 2013067872 W JP2013067872 W JP 2013067872W WO 2014007172 A1 WO2014007172 A1 WO 2014007172A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- counter
- mobile station
- public key
- received
- held
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the present invention relates to a mobile communication method and a mobile station.
- ETWS Earthquake and Tsunami Warning System
- CMAS Commercial Mobile Alert System
- KPAS Korean Public Alert System
- EU-AlertP EU-AlertP
- EU-AlertP EU-AlertP
- Warning message (Secondary message)” is configured to be repeated periodically, and thus a case where such a repetition cycle is short is assumed.
- CMAS stipulates that “Warning message” having a plurality of different contents can be transmitted in parallel.
- the present invention has been made in view of the above-described problems.
- the mobile station UE while avoiding an increase in network load, the mobile station UE appropriately receives “Warning messages” transmitted with different contents one after another. It is an object of the present invention to provide a mobile communication method and a mobile station that can be used.
- a first feature of the present invention is a mobile communication method in which a radio base station notifies the mobile station of the warning information and a digital signature generated based on the counter together with the warning information and the counter.
- the mobile station performs a verification process on the digital signature using a predetermined public key, compares the received counter with a held counter, and the mobile station A step of displaying the received warning information when the verification process is successful and the received counter is determined to be the same as or more advanced than the held counter. Is the gist.
- a mobile station configured to receive a warning information and a digital signature generated based on the counter together with the warning information and the counter from the radio base station.
- a verification unit configured to perform verification processing on the digital signature using a predetermined public key, and to compare the received counter with a held counter, and the verification processing And when the received counter is determined to be the same as or more advanced than the held counter, the received warning information is displayed.
- a display unit configured to display a warning information and a digital signature generated based on the counter together with the warning information and the counter from the radio base station.
- a verification unit configured to perform verification processing on the digital signature using a predetermined public key, and to compare the received counter with a held counter, and the verification processing And when the received counter is determined to be the same as or more advanced than the held counter, the received warning information is displayed.
- a display unit configured to display a display unit.
- FIG. 1 is an overall configuration diagram of a mobile communication system according to a first embodiment of the present invention.
- FIG. 2 is a functional block diagram of the mobile station according to the first embodiment of the present invention.
- FIG. 3 is a sequence diagram showing operations of the mobile communication system according to the first embodiment of the present invention.
- FIG. 4 is a sequence diagram showing operations of the mobile communication system according to the first embodiment of the present invention.
- FIG. 5 is a flowchart showing the operation of the mobile station according to the first embodiment of the present invention.
- Mobile communication system according to the first embodiment of the present invention A mobile communication system according to a first embodiment of the present invention will be described with reference to FIG. 1 to FIG.
- an LTE mobile communication system will be described as an example.
- the present invention is not limited to such a mobile communication system, and is applicable to other mobile communication systems.
- the emergency information distribution system includes a cell broadcast entity CBE (Cell Broadcast Entity), a cell broadcast center CBC (Cell Broadcast Center), and a mobility management node MME (Mobility Management Entity).
- CBE Cell Broadcast Entity
- CBC Cell Broadcast Center
- MME Mobility Management Entity
- the mobile station UE includes a transmission unit 10, a reception unit 11, a verification unit 12, and a display unit 13.
- the transmission unit 10 is configured to transmit various signals to the radio base station eNB.
- the transmission unit 10 is configured to transmit “Attach Request” and “TAU (Tracking Area Update) Request” addressed to the mobility management node MME to the radio base station eNB.
- Attach Request and “TAU (Tracking Area Update) Request” addressed to the mobility management node MME to the radio base station eNB.
- TAU Track Area Update
- the receiving unit 11 is configured to receive various signals from the radio base station eNB.
- the receiving unit 11 is configured to receive “NAS Security Mode Command” and broadcast information (Broadcast Information) from the radio base station eNB.
- the receiving unit 11 is generated based on the “Warning message” and “Counter cw” together with the “Warning message (warning information)” and “Counter cw (counter)” via the broadcast information. It is configured to receive a “Signature (digital signature)”.
- the receiving unit 11 is configured to receive “counter cs (counter)” and a predetermined public key Pk in an attach process or a location registration (TAU) process.
- the receiving unit 11 is configured to receive a new “counter cs” via the notification information at a predetermined timing.
- the new “counter cs” may be given a digital signature.
- the predetermined public key Pk may be configured not to be transmitted at a timing other than the attach process and the position registration process.
- the network can transmit “Counter cw” at a predetermined timing, that is, at a timing other than the attach processing and the location registration processing (for example, timing when transmission of a series of “Warning message” is completed). It is configured.
- Counter cw and counter cs are counters incremented by the network, and are configured to take numerical values within a predetermined range.
- Counter cw and counter cs are configured to return to the minimum value when incremented from the maximum value.
- the verification unit 12 is configured to perform a verification process on “Signature” received by the reception unit 11 using a predetermined public key Pk.
- the verification unit 12 is configured to compare “Counter cw” received by the receiving unit 11 with “counter cs” held by itself.
- the verification unit 12 is configured to hold the “counter cs” and the predetermined public key Pk received by the reception unit 11 in the attach process or the location registration process.
- the verification unit 12 is configured to newly hold “counter cs” received by the reception unit 11 at a predetermined timing.
- the verification unit 12 includes only the new “Counter cw” (incremented “Counter cw”) in the broadcast information received from the radio base station eNB (including the new predetermined public key Pk). If not, the stored “counter cs” may be updated, and the held public key Pk may be used for the verification process for “Signature” without being updated. .
- the verification unit 12 may be configured to compare “Counter cw” and “counter cs” only when the above-described verification process is successful.
- the display unit 13 is configured to display the “Warning message” received by the receiving unit 11.
- the display unit 13 may be configured to display the content of the “Warning message” on the display, or may be configured to output audio information corresponding to the content of the “Warning message”. Good.
- the display unit 13 determines that the “Counter cw” is the same as the “counter cs” or is ahead of the “counter cs” when the verification unit 12 determines that the verification process is successful. In such a case, the “Warning message” is displayed.
- the display unit 13 determines that “Counter cw” is the same as “counter cs” or more advanced than “counter cs” even when the verification unit 12 succeeds in the verification process for “Signature”. If not, the “Warning message” may be configured to be discarded.
- the network may be configured to be able to transmit “Warning messages” having a plurality of different contents without incrementing “Counter cw”.
- step S1001 the mobile station UE transmits “Attach Request” or “TAU Request” to the mobility management node MME via the radio base station eNB.
- step S1002 “ESP AKA procedure” is performed between the mobile station UE and the mobility management node MME.
- step S1003 the mobility management node MME transmits “NAS Security Mode Command” to the radio base station eNB.
- the “NAS Security Mode Command” includes a predetermined public key Pk (latest), “counter cs”, “signing entity ID”, and the like.
- step S1004 the radio base station eNB transmits “NAS Security Mode Command” to the mobile station UE.
- the “NAS Security Mode Command” includes a predetermined public key Pk (latest), “counter cs”, “signing entity ID”, and the like.
- the mobile station UE holds a predetermined public key Pk and “counter cs” included in the received “NAS Security Mode Command”.
- step S1005 the mobile station UE transmits “NAS Security Mode Command Complete” to the radio base station eNB.
- step SS1006 the radio base station eNB sends “NAS Security Mode to the mobility management node MME. Send Command Complete.
- step S1007 the mobile station UE transmits “Attach Accept” or “TAU Accept” to the mobility management node MME via the radio base station eNB.
- the network notifies the mobile station UE of a new “counter cs” via the broadcast information at a predetermined timing in order to update the “counter cs” held in the mobile station UE. can do.
- the predetermined public key Pk held in the mobile station UE is not updated.
- the mobile station UE when the mobile station UE receives a new “counter cs”, the mobile station UE updates the “counter cs” held by the mobile station UE with the new “counter cs”.
- step S2001 the cell broadcast entity CBE transmits “Emergency Broadcast Request” to the cell broadcast center CBC.
- “Emergency Broadcast Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
- the “Signature” is a digital signature generated based on the “Warning message” and the “Counter cw”.
- step S2002 the cell broadcast center CBC transmits “Write-Replace Warning Request” to the mobility management node MME.
- “Write-Replace Warning Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
- step S2003 the mobility management node MME transmits “Write-Replace Warning Confirm” to the cell broadcast center CBC.
- step S2004 the cell broadcast center CBC transmits “Emergency Broadcast Response” to the cell broadcast entity CBE.
- step S2005 the mobility management node MME transmits “Write-Replace Warning Request” to the radio base station eNB.
- “Write-Replace Warning Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
- step S2006 the radio base station eNB transmits broadcast information to the mobile station UE.
- the notification information includes “Warning message”, “Counter cw”, “Signature”, and the like.
- the mobile station UE when the mobile station UE receives broadcast information including “Warning message”, “Counter cw”, “Signature”, and the like in step S101, the mobile station UE stores the predetermined information held by itself in step S102. Using the public key Pk, a verification process for the “Signature” is performed.
- step S103 If the verification process is successful in step S103, the operation proceeds to step S104. If the verification process fails, the operation proceeds to step S106.
- step S104 the mobile station UE compares the “Counter cw” with the “counter cs” held by itself.
- step S105 If it is determined that “Counter cw” is ahead of “counter cs”, the operation proceeds to step S105. If it is determined that “Counter cw” is not ahead of “counter cs”, this operation is performed. Operation proceeds to step S106.
- step S105 the mobile station UE displays the “Warning message”.
- step S106 the mobile station UE does not display such “Warning message”.
- the mobile station UE does not need to update the public key Pk for verifying the validity of the “Warning message” for each “Warning message”. Even when a “Warning message” having a different content is transmitted, the “Warning message” can be appropriately received.
- the counter corresponding to the public key Pk for verifying the validity of the “Warning message” that is, “Counter” Since “cw” is updated, a security effect equivalent to “a new key is used for each“ Warning message ””, which is a premise in the existing PWS, can be realized.
- Modification 1 the mobile communication system according to the first modification of the present invention will be described by focusing on the differences from the mobile communication system according to the first embodiment described above.
- the network updates the mobile station via the broadcast information at a predetermined timing in order to update the predetermined public key Pk and “counter cs” held in the mobile station UE.
- a new predetermined public key Pk can be notified to the UE together with a new “counter cs”.
- a new “counter cs” may be given a digital signature.
- the mobile station UE receives a new “counter cs” and a new predetermined public key Pk (that is, the broadcast information includes both the new “counter cs” and the new predetermined public key Pk). If so, the “counter cs” and the predetermined public key Pk held by itself are updated by the new “counter cs” and the new predetermined public key Pk.
- the network transmits “Counter cw” and a predetermined public key Pk at a predetermined timing, that is, at timings other than the attach process and the location registration process (for example, when a series of “Warning message” transmission is completed). You may be comprised so that it can do.
- the network may be configured to simultaneously transmit “Counter cw” and the predetermined public key Pk, or transmit only one of “Counter cw” and the predetermined public key Pk. It may be configured.
- the first feature of the present embodiment is a mobile communication method, in which the radio base station eNB sends “Warning message (warning information)” and “Counter cw (counter)” to the mobile station UE.
- the mobile station UE may further include a step of receiving and holding “counter cs” and a predetermined public key Pk in the attach process or the location registration process.
- the network (wireless base station eNB) further includes a step of updating only “counter cs” held by the mobile station UE using broadcast information at a predetermined timing. May be.
- the network (radio base station eNB) updates “counter cs” and a predetermined public key Pk held by the mobile station UE using broadcast information at a predetermined timing. You may have a process further.
- the mobile station UE when the mobile station UE receives the broadcast information described above, the mobile station UE updates the held “counter cs” and updates the held public key Pk.
- the verification process for “Signature” may be used subsequently.
- the mobile station UE may update the predetermined public key Pk and “counter cs” held when the broadcast information is received.
- the second feature of the present embodiment is the mobile station UE, which is generated from the radio base station eNB based on the “Warning message” and “Counter cw” together with the “Warning message” and “Counter cw”.
- the receiving unit 11 configured to receive “Signature” and a predetermined public key Pk, the “Signature” is verified, and the received “Counter cw” is held.
- the verification unit 12 configured to compare “counter cs” and the received “Counter cw” when the verification process is successful and the received “Counter cw” is the same as the “counter cs” or “ It is judged that it is ahead of “counter cs” If, and summarized in that and a display unit 13 configured to display a "Warning message" received.
- the verification unit 12 may be configured to receive and hold “counter cs” and a predetermined public key Pk in the attach process or the position registration process.
- the verification unit 12 updates the held “counter cs” according to the broadcast information received from the radio base station eNB, and holds the held public key Pk. May be configured to continue to be used for the verification process without being updated.
- the verification unit 12 is configured to update a predetermined public key Pk and “counter cs” that are held in accordance with broadcast information received from the radio base station eNB. May be.
- the operations of the mobile station UE, the radio base station eNB, and the mobility management node MME described above may be implemented by hardware, may be implemented by a software module executed by a processor, or may be a combination of both. May be implemented.
- the software modules include RAM (Random Access Memory), flash memory, ROM (Read Only Memory), EPROM (Erasable Programmable ROM), EEPROM (Electronically Erasable and Programmable, Removable ROM, Hard Disk, and Removable ROM).
- RAM Random Access Memory
- flash memory ROM (Read Only Memory)
- EPROM Erasable Programmable ROM
- EEPROM Electrically Erasable and Programmable, Removable ROM, Hard Disk, and Removable ROM.
- it may be provided in a storage medium of an arbitrary format such as a CD-ROM.
- the storage medium is connected to the processor so that the processor can read and write information from and to the storage medium. Further, such a storage medium may be integrated in the processor. Such a storage medium and processor may be provided in the ASIC. Such an ASIC may be provided in the mobile station UE, the radio base station eNB, or the mobility management node MME. Further, the storage medium and the processor may be provided as a discrete component in the mobile station UE, the radio base station eNB, or the mobility management node MME.
- the mobile station UE can appropriately receive “Warning message” transmitted with different contents one after another while avoiding an increase in network load.
- a method and a mobile station can be provided.
- UE ... mobile station 10 ... transmission unit 11 ... reception unit 12 ... verification unit 13 ... display unit
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Emergency Management (AREA)
- Public Health (AREA)
- Environmental & Geological Engineering (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
In a public warning system (PWS), in order for a mobile terminal (UE) to appropriately receive a "Warning message" transmitted in content that successively differs, while preventing an increase in a network load, this mobile communication method has: a step in which a mobile base station (eNB) notifies the mobile terminal (UE) of the "Warning message" and a "Counter cw", and a "Signature" generated on the basis of the "Warning message" and the "Counter cw"; a step in which the mobile terminal (UE) uses a prescribed public key (Pk) to perform a verification process on the "Signature", and compares the "Counter cw" and a "counter cs"; and a step in which the mobile terminal (UE) displays the "Warning message" when the abovementioned verification process has succeeded, and when it has been determined that the "Counter cw" is ahead of the "counter cs".
Description
本発明は、移動通信方法及び移動局に関する。
The present invention relates to a mobile communication method and a mobile station.
従来、ETWS(Earthquake and Tsunami Warning System)やCMAS(Commercial Mobile Alert System)やKPAS(Korean Public Alert System)やEU-Alert(European Union Alert)等のPWS(Public Warning System)が知られている。
Conventionally, ETWS (Earthquake and Tsunami Warning System), CMAS (Commercial Mobile Alert System), KPAS (Korean Public Alert System), EU-AlertP, and EU-AlertP.
現状では、PWSのためのセキュリティ(Security)は規定されていない。ただし、PWSのためのセキュリティとしては、公開鍵(Public Key)及びデジタル署名(Digital Signature)を用いる方向で検討されている。
Currently, security for PWS is not specified. However, as security for PWS, studies are being made in the direction of using a public key (Public Key) and a digital signature (Digital Signature).
また、現状のPWSでは、「Warning message」ごとに新規の鍵(key)が用いられること、「Warning message」を送信する機会は稀であるため、移動局UEにおいて鍵の更新(re-keying)を行う時間が十分にあること、及び、公開鍵がアタッチ処理(Attach)において「NAS Security Mode Command」で送信されることを前提としている。
Further, in the current PWS, since a new key is used for each “Warning message” and there is rarely an opportunity to transmit the “Warning message”, the key update (re-keying) is performed in the mobile station UE. It is assumed that there is sufficient time to perform the operation, and that the public key is transmitted in “NAS Security Mode Command” in the attach process (Attach).
しかしながら、現状でも、PWSにおいて、発生した「Warning message」が、連続して更新されるケースが想定される。
However, even in the present situation, it is assumed that the generated “Warning message” is continuously updated in the PWS.
例えば、ETWSの場合、「Primary message」と「Secondary message」との間の時間差が小さいケースが想定される。
For example, in the case of ETWS, a case where the time difference between the “Primary message” and the “Secondary message” is small is assumed.
また、CMAS及びETWSの場合、「Warning message(Secondary message)」が周期的に繰り返されるように構成されているため、かかる繰り返し周期が短いケースが想定される。
Also, in the case of CMAS and ETWS, “Warning message (Secondary message)” is configured to be repeated periodically, and thus a case where such a repetition cycle is short is assumed.
さらに、CMASでは、複数の異なる内容の「Warning message」を並列に送信することができるように規定されている。
Furthermore, CMAS stipulates that “Warning message” having a plurality of different contents can be transmitted in parallel.
以上のように、現状のPWSにおいても、次々と異なる内容の「Warning message」が送信されるケースが想定され、かかるケースでは、移動局UEにおいて鍵の更新を行う時間が十分になく、移動局UEが「Warning message」を受信することができなくなるケースが発生し得るという問題点があった。
As described above, even in the current PWS, a case where “Warning messages” having different contents are transmitted one after another is assumed. In such a case, the mobile station UE does not have sufficient time to update the key, and the mobile station There has been a problem that the UE may not be able to receive the “Warning message”.
また、「Warning message」を送信する度に、全ての移動局UEに対する鍵の更新手順を行うためには、ネットワーク負荷が増大してしまうという問題点があった。
In addition, every time a “Warning message” is transmitted, in order to perform a key update procedure for all mobile stations UE, there is a problem that the network load increases.
そこで、本発明は、上述の課題に鑑みてなされたものであり、PWSにおいて、ネットワーク負荷の増大を回避しつつ、次々と異なる内容で送信される「Warning message」を移動局UEにおいて適切に受信することができる移動通信方法及び移動局を提供することを目的とする。
Therefore, the present invention has been made in view of the above-described problems. In the PWS, while avoiding an increase in network load, the mobile station UE appropriately receives “Warning messages” transmitted with different contents one after another. It is an object of the present invention to provide a mobile communication method and a mobile station that can be used.
本発明の第1の特徴は、移動通信方法であって、無線基地局が、移動局に対して、警告情報及びカウンタと共に、該警告情報及び該カウンタに基づいて生成されたデジタル署名を通知する工程と、前記移動局が、所定の公開鍵を用いて前記デジタル署名に対して検証処理を行うと共に、受信した前記カウンタと保持しているカウンタとを比較する工程と、前記移動局が、前記検証処理に成功した場合で、かつ、受信した前記カウンタが、保持している前記カウンタと同じ或いは該カウンタよりも進んでいると判断した場合、受信した前記警告情報を表示する工程とを有することを要旨とする。
A first feature of the present invention is a mobile communication method in which a radio base station notifies the mobile station of the warning information and a digital signature generated based on the counter together with the warning information and the counter. The mobile station performs a verification process on the digital signature using a predetermined public key, compares the received counter with a held counter, and the mobile station A step of displaying the received warning information when the verification process is successful and the received counter is determined to be the same as or more advanced than the held counter. Is the gist.
本発明の第2の特徴は、移動局であって、無線基地局から、警告情報及びカウンタと共に、該警告情報及び該カウンタに基づいて生成されたデジタル署名を受信するように構成されている受信部と、所定の公開鍵を用いて、前記デジタル署名に対して検証処理を行うと共に、受信した前記カウンタと保持しているカウンタとを比較するように構成されている検証部と、前記検証処理に成功した場合で、かつ、受信した前記カウンタが、保持している前記カウンタと同じ或いは該カウンタよりも進んでいると判断された場合、受信した前記警告情報を表示するように構成されている表示部とを具備することを要旨とする。
According to a second aspect of the present invention, there is provided a mobile station that is configured to receive a warning information and a digital signature generated based on the counter together with the warning information and the counter from the radio base station. And a verification unit configured to perform verification processing on the digital signature using a predetermined public key, and to compare the received counter with a held counter, and the verification processing And when the received counter is determined to be the same as or more advanced than the held counter, the received warning information is displayed. And a display unit.
(本発明の第1の実施形態に係る移動通信システム)
図1乃至図5を参照して、本発明の第1の実施形態に係る移動通信システムについて説明する。 (Mobile communication system according to the first embodiment of the present invention)
A mobile communication system according to a first embodiment of the present invention will be described with reference to FIG. 1 to FIG.
図1乃至図5を参照して、本発明の第1の実施形態に係る移動通信システムについて説明する。 (Mobile communication system according to the first embodiment of the present invention)
A mobile communication system according to a first embodiment of the present invention will be described with reference to FIG. 1 to FIG.
本実施形態では、LTE方式の移動通信システムを例に挙げて説明するが、本発明は、かかる移動通信システムに限定されず、他の方式の移動通信システムにも適用可能である。
In the present embodiment, an LTE mobile communication system will be described as an example. However, the present invention is not limited to such a mobile communication system, and is applicable to other mobile communication systems.
図1に示すように、本実施形態に係る緊急情報配信システムは、セル報知エンティティCBE(Cell Broadcast Entity)と、セル報知センターCBC(Cell Broadcast Center)と、移動管理ノードMME(Mobility Management Entity)と、無線基地局eNBと、移動局UEとを具備している。
As shown in FIG. 1, the emergency information distribution system according to the present embodiment includes a cell broadcast entity CBE (Cell Broadcast Entity), a cell broadcast center CBC (Cell Broadcast Center), and a mobility management node MME (Mobility Management Entity). A radio base station eNB and a mobile station UE.
図2に示すように、移動局UEは、送信部10と、受信部11と、検証部12と、表示部13とを具備している。
As shown in FIG. 2, the mobile station UE includes a transmission unit 10, a reception unit 11, a verification unit 12, and a display unit 13.
送信部10は、無線基地局eNBに対して、各種信号を送信するように構成されている。例えば、送信部10は、無線基地局eNBに対して、移動管理ノードMME宛ての「Attach Request」や「TAU(Tracking Area Update) Request」を送信するように構成されている。
The transmission unit 10 is configured to transmit various signals to the radio base station eNB. For example, the transmission unit 10 is configured to transmit “Attach Request” and “TAU (Tracking Area Update) Request” addressed to the mobility management node MME to the radio base station eNB.
受信部11は、無線基地局eNBから、各種信号を受信するように構成されている。例えば、受信部11は、無線基地局eNBから「NAS Security Mode Command」や報知情報(Broadcast Information)を受信するように構成されている。
The receiving unit 11 is configured to receive various signals from the radio base station eNB. For example, the receiving unit 11 is configured to receive “NAS Security Mode Command” and broadcast information (Broadcast Information) from the radio base station eNB.
具体的には、受信部11は、報知情報を介して、「Warning message(警告情報)」及び「Counter cw(カウンタ)」と共に、かかる「Warning message」及び「Counter cw」に基づいて生成された「Signature(デジタル署名)」を受信するように構成されている。
Specifically, the receiving unit 11 is generated based on the “Warning message” and “Counter cw” together with the “Warning message (warning information)” and “Counter cw (counter)” via the broadcast information. It is configured to receive a “Signature (digital signature)”.
また、受信部11は、アタッチ(Attach)処理或いは位置登録(TAU)処理において、「counter cs(カウンタ)」及び所定の公開鍵Pkを受信するように構成されている。
In addition, the receiving unit 11 is configured to receive “counter cs (counter)” and a predetermined public key Pk in an attach process or a location registration (TAU) process.
さらに、受信部11は、所定タイミングで、報知情報を介して、新たな「counter cs」を受信するように構成されている。なお、かかる新たな「counter cs」には、デジタル署名が付与されていてもよい。
Furthermore, the receiving unit 11 is configured to receive a new “counter cs” via the notification information at a predetermined timing. The new “counter cs” may be given a digital signature.
なお、本実施形態に係る移動通信システムでは、所定の公開鍵Pkは、アタッチ処理及び位置登録処理以外のタイミングでは、送信されないように構成されていてもよい。
In the mobile communication system according to the present embodiment, the predetermined public key Pk may be configured not to be transmitted at a timing other than the attach process and the position registration process.
また、ネットワークは、所定タイミングで、すなわち、アタッチ処理及び位置登録処理以外のタイミング(例えば、一連の「Warning message」の送信が完了したタイミング)において、「Counter cw」を送信することができるように構成されている。
In addition, the network can transmit “Counter cw” at a predetermined timing, that is, at a timing other than the attach processing and the location registration processing (for example, timing when transmission of a series of “Warning message” is completed). It is configured.
なお、「Counter cw」及び「counter cs」は、ネットワークによってインクリメントされるカウンタであって、所定範囲内の数値を取るように構成されている。ここで、「Counter cw」及び「counter cs」は、最大値からインクリメントされると最小値に戻るように構成されている。
Note that “Counter cw” and “counter cs” are counters incremented by the network, and are configured to take numerical values within a predetermined range. Here, “Counter cw” and “counter cs” are configured to return to the minimum value when incremented from the maximum value.
検証部12は、所定の公開鍵Pkを用いて、受信部11によって受信された「Signature」に対して検証処理を行うように構成されている。
The verification unit 12 is configured to perform a verification process on “Signature” received by the reception unit 11 using a predetermined public key Pk.
また、検証部12は、受信部11によって受信された「Counter cw」と自身が保持している「counter cs」とを比較するように構成されている。
Also, the verification unit 12 is configured to compare “Counter cw” received by the receiving unit 11 with “counter cs” held by itself.
ここで、検証部12は、アタッチ処理或いは位置登録処理において、受信部11によって受信された「counter cs」及び所定の公開鍵Pkを保持するように構成されている。
Here, the verification unit 12 is configured to hold the “counter cs” and the predetermined public key Pk received by the reception unit 11 in the attach process or the location registration process.
また、検証部12は、所定タイミングで、受信部11によって受信された「counter cs」を新たに保持するように構成されている。
The verification unit 12 is configured to newly hold “counter cs” received by the reception unit 11 at a predetermined timing.
すなわち、検証部12は、無線基地局eNBから受信した報知情報に、新たな「Counter cw」(インクリメントされた「Counter cw」)のみが含まれている場合(新たな所定の公開鍵Pkが含まれていない場合)、保持している「counter cs」を更新し、保持している所定の公開鍵Pkについては更新することなく「Signature」に対する検証処理に引き続き用いるように構成されていてもよい。
That is, the verification unit 12 includes only the new “Counter cw” (incremented “Counter cw”) in the broadcast information received from the radio base station eNB (including the new predetermined public key Pk). If not, the stored “counter cs” may be updated, and the held public key Pk may be used for the verification process for “Signature” without being updated. .
なお、検証部12は、上述の検証処理が成功した場合にのみ、「Counter cw」と「counter cs」とを比較するように構成されていてもよい。
Note that the verification unit 12 may be configured to compare “Counter cw” and “counter cs” only when the above-described verification process is successful.
表示部13は、受信部11によって受信された「Warning message」を表示するように構成されている。
The display unit 13 is configured to display the “Warning message” received by the receiving unit 11.
例えば、表示部13は、かかる「Warning message」の内容をディスプレイに表示するように構成されていてもよいし、「Warning message」の内容に対応する音声情報を出力するように構成されていてもよい。
For example, the display unit 13 may be configured to display the content of the “Warning message” on the display, or may be configured to output audio information corresponding to the content of the “Warning message”. Good.
また、表示部13は、検証部12によって、かかる検証処理に成功したと判断された場合で、かつ、「Counter cw」が「counter cs」と同じ或いは「counter cs」よりも進んでいると判断された場合、かかる「Warning message」を表示するように構成されている。
Further, the display unit 13 determines that the “Counter cw” is the same as the “counter cs” or is ahead of the “counter cs” when the verification unit 12 determines that the verification process is successful. In such a case, the “Warning message” is displayed.
ここで、表示部13は、検証部12による「Signature」に対する検証処理に成功した場合であっても、「Counter cw」が「counter cs」と同じ或いは「counter cs」よりも進んでいると判断しない場合には、かかる「Warning message」を廃棄するように構成されていてもよい。
Here, the display unit 13 determines that “Counter cw” is the same as “counter cs” or more advanced than “counter cs” even when the verification unit 12 succeeds in the verification process for “Signature”. If not, the “Warning message” may be configured to be discarded.
なお、ネットワークは、「Counter cw」をインクリメントすることなく、複数の異なる内容の「Warning message」を送信することができるように構成されていてもよい。
Note that the network may be configured to be able to transmit “Warning messages” having a plurality of different contents without incrementing “Counter cw”.
以下、図3乃至図5を参照して、本実施形態に係る移動通信システムの動作について説明する。
Hereinafter, the operation of the mobile communication system according to the present embodiment will be described with reference to FIGS. 3 to 5.
第1に、図3を参照して、本実施形態に係る移動通信システムにおけるアタッチ処理或いは位置登録処理の動作について説明する。
First, with reference to FIG. 3, an operation of an attach process or a position registration process in the mobile communication system according to the present embodiment will be described.
図3に示すように、ステップS1001において、移動局UEは、無線基地局eNBを介して、移動管理ノードMMEに対して、「Attach Request」又は「TAU Request」を送信する。
As shown in FIG. 3, in step S1001, the mobile station UE transmits “Attach Request” or “TAU Request” to the mobility management node MME via the radio base station eNB.
ステップS1002において、移動局UEと移動管理ノードMMEとの間で「ESP AKA procedure」が行われる。
In step S1002, “ESP AKA procedure” is performed between the mobile station UE and the mobility management node MME.
ステップS1003において、移動管理ノードMMEは、無線基地局eNBに対して、「NAS Security Mode Command」を送信する。
In step S1003, the mobility management node MME transmits “NAS Security Mode Command” to the radio base station eNB.
ここで、「NAS Security Mode Command」には、所定の公開鍵Pk(最新)や「counter cs」や「signing entity ID」等が含まれている。
Here, the “NAS Security Mode Command” includes a predetermined public key Pk (latest), “counter cs”, “signing entity ID”, and the like.
ステップS1004において、無線基地局eNBが、移動局UEに対して、「NAS Security Mode Command」を送信する。
In step S1004, the radio base station eNB transmits “NAS Security Mode Command” to the mobile station UE.
ここで、「NAS Security Mode Command」には、所定の公開鍵Pk(最新)や「counter cs」や「signing entity ID」等が含まれている。
Here, the “NAS Security Mode Command” includes a predetermined public key Pk (latest), “counter cs”, “signing entity ID”, and the like.
ここで、移動局UEは、受信した「NAS Security Mode Command」に含まれる所定の公開鍵Pk及び「counter cs」を保持する。
Here, the mobile station UE holds a predetermined public key Pk and “counter cs” included in the received “NAS Security Mode Command”.
ステップS1005において、移動局UEが、無線基地局eNBに対して、「NAS Security Mode Command Complete」を送信し、ステップSS1006において、無線基地局eNBが、移動管理ノードMMEに対して、「NAS Security Mode Command Complete」を送信する。
In step S1005, the mobile station UE transmits “NAS Security Mode Command Complete” to the radio base station eNB. In step SS1006, the radio base station eNB sends “NAS Security Mode to the mobility management node MME. Send Command Complete.
ステップS1007において、移動局UEが、無線基地局eNBを介して、移動管理ノードMMEに対して、「Attach Accept」又は「TAU Accept」を送信する。
In step S1007, the mobile station UE transmits “Attach Accept” or “TAU Accept” to the mobility management node MME via the radio base station eNB.
なお、その後、ネットワークは、移動局UEにおいて保持されている「counter cs」を更新するために、所定タイミングで、報知情報を介して、移動局UEに対して、新たな「counter cs」を通知することができる。 ただし、本実施形態における移動通信システムでは、移動局UEにおいて保持されている所定の公開鍵Pkを更新しないものとする。
After that, the network notifies the mobile station UE of a new “counter cs” via the broadcast information at a predetermined timing in order to update the “counter cs” held in the mobile station UE. can do. However, in the mobile communication system according to the present embodiment, the predetermined public key Pk held in the mobile station UE is not updated.
かかる場合、移動局UEは、新たな「counter cs」を受信した場合、かかる新たな「counter cs」によって、自身が保持している「counter cs」を更新する。
In this case, when the mobile station UE receives a new “counter cs”, the mobile station UE updates the “counter cs” held by the mobile station UE with the new “counter cs”.
第2に、図4を参照して、本実施形態に係る移動通信システムにおいて「Warning message」を送信する動作について説明する。
Second, with reference to FIG. 4, an operation of transmitting a “Warning message” in the mobile communication system according to the present embodiment will be described.
図4に示すように、ステップS2001において、セル報知エンティティCBEが、セル報知センターCBCに対して、「Emergency Broadcast Request」を送信する。
As shown in FIG. 4, in step S2001, the cell broadcast entity CBE transmits “Emergency Broadcast Request” to the cell broadcast center CBC.
ここで、「Emergency Broadcast Request」には、「Warning message」や「Counter cw」や「Signature」等が含まれている。
Here, “Emergency Broadcast Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
なお、かかる「Signature」は、「Warning message」及び「Counter cw」に基づいて生成されるデジタル署名である。
The “Signature” is a digital signature generated based on the “Warning message” and the “Counter cw”.
ステップS2002において、セル報知センターCBCが、移動管理ノードMMEに対して、「Write-Replace Warning Request」を送信する。
In step S2002, the cell broadcast center CBC transmits “Write-Replace Warning Request” to the mobility management node MME.
ここで、「Write-Replace Warning Request」には、「Warning message」や「Counter cw」や「Signature」等が含まれている。
Here, “Write-Replace Warning Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
ステップS2003において、移動管理ノードMMEが、セル報知センターCBCに対して、「Write-Replace Warning Confirm」を送信する。
In step S2003, the mobility management node MME transmits “Write-Replace Warning Confirm” to the cell broadcast center CBC.
ステップS2004において、セル報知センターCBCが、セル報知エンティティCBEに対して、「Emergency Broadcast Response」を送信する。
In step S2004, the cell broadcast center CBC transmits “Emergency Broadcast Response” to the cell broadcast entity CBE.
ステップS2005において、移動管理ノードMMEが、無線基地局eNBに対して、「Write-Replace Warning Request」を送信する。
In step S2005, the mobility management node MME transmits “Write-Replace Warning Request” to the radio base station eNB.
ここで、「Write-Replace Warning Request」には、「Warning message」や「Counter cw」や「Signature」等が含まれている。
Here, “Write-Replace Warning Request” includes “Warning message”, “Counter cw”, “Signature”, and the like.
ステップS2006において、無線基地局eNBが、移動局UEに対して、報知情報を送信する。
In step S2006, the radio base station eNB transmits broadcast information to the mobile station UE.
ここで、かかる報知情報には、「Warning message」や「Counter cw」や「Signature」等が含まれている。
Here, the notification information includes “Warning message”, “Counter cw”, “Signature”, and the like.
第3に、図5を参照して、本実施形態に係る移動通信システムにおいて、移動局UEが「Warning message」を含む報知情報を受信した場合の動作について説明する。
Third, with reference to FIG. 5, an operation when the mobile station UE receives broadcast information including “Warning message” in the mobile communication system according to the present embodiment will be described.
図5に示すように、移動局UEは、ステップS101において、「Warning message」や「Counter cw」や「Signature」等を含む報知情報を受信すると、ステップS102において、自身が保持している所定の公開鍵Pkを用いて、かかる「Signature」に対する検証処理を行う。
As illustrated in FIG. 5, when the mobile station UE receives broadcast information including “Warning message”, “Counter cw”, “Signature”, and the like in step S101, the mobile station UE stores the predetermined information held by itself in step S102. Using the public key Pk, a verification process for the “Signature” is performed.
ステップS103において、かかる検証処理が成功すると、本動作は、ステップS104に進み、かかる検証処理が失敗すると、本動作は、ステップS106に進む。
If the verification process is successful in step S103, the operation proceeds to step S104. If the verification process fails, the operation proceeds to step S106.
ステップS104において、移動局UEは、かかる「Counter cw」と、自身が保持している「counter cs」とを比較する。
In step S104, the mobile station UE compares the “Counter cw” with the “counter cs” held by itself.
「Counter cw」が「counter cs」よりも進んでいると判断された場合、本動作は、ステップS105に進み、「Counter cw」が「counter cs」よりも進んでいないと判断された場合、本動作は、ステップS106に進む。
If it is determined that “Counter cw” is ahead of “counter cs”, the operation proceeds to step S105. If it is determined that “Counter cw” is not ahead of “counter cs”, this operation is performed. Operation proceeds to step S106.
ステップS105において、移動局UEは、かかる「Warning message」表示する。
In step S105, the mobile station UE displays the “Warning message”.
一方、ステップS106において、移動局UEは、かかる「Warning message」表示しない。
On the other hand, in step S106, the mobile station UE does not display such “Warning message”.
本実施形態に係る移動通信システムによれば、PWSにおいて、移動局UEは、「Warning message」の正当性を検証するための公開鍵Pkを「Warning message」ごとに更新する必要がなくなるため、次々と異なる内容の「Warning message」が送信される場合であっても、かかる「Warning message」を適切に受信することができる。
According to the mobile communication system according to the present embodiment, in the PWS, the mobile station UE does not need to update the public key Pk for verifying the validity of the “Warning message” for each “Warning message”. Even when a “Warning message” having a different content is transmitted, the “Warning message” can be appropriately received.
この結果、「Warning message」を送信する度に、全ての移動局UEに対する鍵の更新手順を行う必要がなくなるため、ネットワーク負荷の増大を回避することができる。
As a result, it is not necessary to perform a key update procedure for all mobile stations UE every time a “Warning message” is transmitted, so that an increase in network load can be avoided.
また、本実施形態に係る移動通信システムによれば、上述の「Warning message」を送信する度に、「Warning message」の正当性を検証するための公開鍵Pkに対応するカウンタ(すなわち、「Counter cw」を更新しているため、既存のPWSにおける前提である「「Warning message」ごとに新規の鍵が用いられること」と同等のセキュリティ効果を実現することができる。
Further, according to the mobile communication system according to the present embodiment, every time the above-mentioned “Warning message” is transmitted, the counter corresponding to the public key Pk for verifying the validity of the “Warning message” (that is, “Counter” Since “cw” is updated, a security effect equivalent to “a new key is used for each“ Warning message ””, which is a premise in the existing PWS, can be realized.
(変更例1)
以下、本発明の変更例1に係る移動通信システムについて、上述の第1の実施形態に係る移動通信システムとの相違点に着目して説明する。 (Modification 1)
Hereinafter, the mobile communication system according to the first modification of the present invention will be described by focusing on the differences from the mobile communication system according to the first embodiment described above.
以下、本発明の変更例1に係る移動通信システムについて、上述の第1の実施形態に係る移動通信システムとの相違点に着目して説明する。 (Modification 1)
Hereinafter, the mobile communication system according to the first modification of the present invention will be described by focusing on the differences from the mobile communication system according to the first embodiment described above.
本変更例1に係る移動通信システムでは、ネットワークは、移動局UEにおいて保持されている所定の公開鍵Pk及び「counter cs」を更新するために、所定タイミングで、報知情報を介して、移動局UEに対して、新たな「counter cs」と共に、新たな所定の公開鍵Pkを通知することができるように構成されている。
In the mobile communication system according to the first modification, the network updates the mobile station via the broadcast information at a predetermined timing in order to update the predetermined public key Pk and “counter cs” held in the mobile station UE. A new predetermined public key Pk can be notified to the UE together with a new “counter cs”.
なお、かかる報知情報において、新たな「counter cs」には、デジタル署名が付与されていてもよい。
In the broadcast information, a new “counter cs” may be given a digital signature.
かかる場合、移動局UEは、新たな「counter cs」及び新たな所定の公開鍵Pkを受信した場合(すなわち、報知情報に新たな「counter cs」及び新たな所定の公開鍵Pkの両方が含まれていた場合)、かかる新たな「counter cs」及び新たな所定の公開鍵Pkによって、自身が保持している「counter cs」及び所定の公開鍵Pkを更新するように構成されている。
In such a case, the mobile station UE receives a new “counter cs” and a new predetermined public key Pk (that is, the broadcast information includes both the new “counter cs” and the new predetermined public key Pk). If so, the “counter cs” and the predetermined public key Pk held by itself are updated by the new “counter cs” and the new predetermined public key Pk.
なお、ネットワークは、所定タイミングで、すなわち、アタッチ処理及び位置登録処理以外のタイミング(例えば、一連の「Warning message」の送信が完了したタイミング)において、「Counter cw」及び所定の公開鍵Pkを送信することができるように構成されていてもよい。
Note that the network transmits “Counter cw” and a predetermined public key Pk at a predetermined timing, that is, at timings other than the attach process and the location registration process (for example, when a series of “Warning message” transmission is completed). You may be comprised so that it can do.
ここで、ネットワークは、「Counter cw」及び所定の公開鍵Pkを同時に送信するように構成されていてもよいし、「Counter cw」及び所定の公開鍵Pkのいずれか一方のみを送信するように構成されていてもよい。
Here, the network may be configured to simultaneously transmit “Counter cw” and the predetermined public key Pk, or transmit only one of “Counter cw” and the predetermined public key Pk. It may be configured.
以上に述べた本実施形態の特徴は、以下のように表現されていてもよい。
The features of the present embodiment described above may be expressed as follows.
本実施形態の第1の特徴は、移動通信方法であって、無線基地局eNBが、移動局UEに対して、「Warning message(警告情報)」及び「Counter cw(カウンタ)」と共に、かかる「Warning message」及び「Counter cw」に基づいて生成された「Signature(デジタル署名)」を通知する工程と、移動局UEが、所定の公開鍵Pkを用いて「Signature」に対して検証処理(Verification)を行うと共に、受信した「Counter cw」と保持している「counter cs」とを比較する工程と、移動局UEが、上述の検証処理に成功した場合で、かつ、受信した「Counter cw」が、保持している「counter cs」と同じ或いは「counter cs」よりも進んでいると判断した場合、受信した「Warning message」を表示する工程とを有することを要旨とする。
The first feature of the present embodiment is a mobile communication method, in which the radio base station eNB sends “Warning message (warning information)” and “Counter cw (counter)” to the mobile station UE. The process of notifying “Signature (digital signature)” generated based on “Warning message” and “Counter cw”, and the mobile station UE performs verification processing (Verification) on “Signature” using a predetermined public key Pk. ) And comparing the received “Counter cw” with the held “counter cs” and the case where the mobile station UE has succeeded in the above-described verification process, and the received “Counter cw” Is the same as the “counter cs” There is summarized in that and a step of displaying when determining that leads the "counter cs", the received "Warning message".
本実施形態の第1の特徴において、移動局UEが、アタッチ処理或いは位置登録処理において、「counter cs」及び所定の公開鍵Pkを受信して保持する工程を更に有してもよい。
In the first feature of the present embodiment, the mobile station UE may further include a step of receiving and holding “counter cs” and a predetermined public key Pk in the attach process or the location registration process.
本実施形態の第1の特徴において、ネットワーク(無線基地局eNB)が、所定タイミングで、報知情報を用いて、移動局UEによって保持されている「counter cs」のみを更新する工程を更に有してもよい。
In the first feature of the present embodiment, the network (wireless base station eNB) further includes a step of updating only “counter cs” held by the mobile station UE using broadcast information at a predetermined timing. May be.
本実施形態の第1の特徴において、ネットワーク(無線基地局eNB)が、所定タイミングで、報知情報を用いて、移動局UEによって保持されている「counter cs」及び所定の公開鍵Pkを更新する工程を更に有してもよい。
In the first feature of the present embodiment, the network (radio base station eNB) updates “counter cs” and a predetermined public key Pk held by the mobile station UE using broadcast information at a predetermined timing. You may have a process further.
本実施形態の第1の特徴において、移動局UEは、上述の報知情報を受信した場合、保持している「counter cs」を更新し、保持している所定の公開鍵Pkについては更新することなく「Signature」に対する検証処理に引き続き用いてもよい。
In the first feature of the present embodiment, when the mobile station UE receives the broadcast information described above, the mobile station UE updates the held “counter cs” and updates the held public key Pk. Alternatively, the verification process for “Signature” may be used subsequently.
本実施形態の第1の特徴において、移動局UEは、上述の報知情報を受信した場合、保持している所定の公開鍵Pk及び「counter cs」を更新してもよい。
In the first feature of the present embodiment, the mobile station UE may update the predetermined public key Pk and “counter cs” held when the broadcast information is received.
本実施形態の第2の特徴は、移動局UEであって、無線基地局eNBから、「Warning message」及び「Counter cw」と共に、かかる「Warning message」及び「Counter cw」に基づいて生成された「Signature」を受信するように構成されている受信部11と、所定の公開鍵Pkを用いて、かかる「Signature」に対して検証処理を行うと共に、受信した「Counter cw」と保持している「counter cs」とを比較するように構成されている検証部12と、かかる検証処理に成功した場合で、かつ、受信した「Counter cw」が、保持している「counter cs」と同じ或いは「counter cs」よりも進んでいると判断された場合、受信した「Warning message」を表示するように構成されている表示部13とを具備することを要旨とする。
The second feature of the present embodiment is the mobile station UE, which is generated from the radio base station eNB based on the “Warning message” and “Counter cw” together with the “Warning message” and “Counter cw”. Using the receiving unit 11 configured to receive “Signature” and a predetermined public key Pk, the “Signature” is verified, and the received “Counter cw” is held. The verification unit 12 configured to compare “counter cs” and the received “Counter cw” when the verification process is successful and the received “Counter cw” is the same as the “counter cs” or “ It is judged that it is ahead of "counter cs" If, and summarized in that and a display unit 13 configured to display a "Warning message" received.
本実施形態の第2の特徴において、検証部12は、アタッチ処理或いは位置登録処理において、「counter cs」及び所定の公開鍵Pkを受信して保持するように構成されていてもよい。
In the second feature of the present embodiment, the verification unit 12 may be configured to receive and hold “counter cs” and a predetermined public key Pk in the attach process or the position registration process.
本実施形態の第2の特徴において、検証部12は、無線基地局eNBから受信した報知情報に応じて、保持している「counter cs」を更新し、保持している所定の公開鍵Pkについては更新することなく前記検証処理に引き続き用いるように構成されていてもよい。
In the second feature of the present embodiment, the verification unit 12 updates the held “counter cs” according to the broadcast information received from the radio base station eNB, and holds the held public key Pk. May be configured to continue to be used for the verification process without being updated.
本実施形態の第2の特徴において、検証部12は、無線基地局eNBから受信した報知情報に応じて、保持している所定の公開鍵Pk及び「counter cs」を更新するように構成されていてもよい。
In the second feature of the present embodiment, the verification unit 12 is configured to update a predetermined public key Pk and “counter cs” that are held in accordance with broadcast information received from the radio base station eNB. May be.
なお、上述の移動局UEや無線基地局eNBや移動管理ノードMMEの動作は、ハードウェアによって実施されてもよいし、プロセッサによって実行されるソフトウェアモジュールによって実施されてもよいし、両者の組み合わせによって実施されてもよい。
Note that the operations of the mobile station UE, the radio base station eNB, and the mobility management node MME described above may be implemented by hardware, may be implemented by a software module executed by a processor, or may be a combination of both. May be implemented.
ソフトウェアモジュールは、RAM(Random Access Memory)や、フラッシュメモリや、ROM(Read Only Memory)や、EPROM(Erasable Programmable ROM)や、EEPROM(Electronically Erasable and Programmable ROM)や、レジスタや、ハードディスクや、リムーバブルディスクや、CD-ROMといった任意形式の記憶媒体内に設けられていてもよい。
The software modules include RAM (Random Access Memory), flash memory, ROM (Read Only Memory), EPROM (Erasable Programmable ROM), EEPROM (Electronically Erasable and Programmable, Removable ROM, Hard Disk, and Removable ROM). Alternatively, it may be provided in a storage medium of an arbitrary format such as a CD-ROM.
かかる記憶媒体は、プロセッサが当該記憶媒体に情報を読み書きできるように、当該プロセッサに接続されている。また、かかる記憶媒体は、プロセッサに集積されていてもよい。また、かかる記憶媒体及びプロセッサは、ASIC内に設けられていてもよい。かかるASICは、移動局UEや無線基地局eNBや移動管理ノードMME内に設けられていてもよい。また、かかる記憶媒体及びプロセッサは、ディスクリートコンポーネントとして移動局UEや無線基地局eNBや移動管理ノードMME内に設けられていてもよい。
The storage medium is connected to the processor so that the processor can read and write information from and to the storage medium. Further, such a storage medium may be integrated in the processor. Such a storage medium and processor may be provided in the ASIC. Such an ASIC may be provided in the mobile station UE, the radio base station eNB, or the mobility management node MME. Further, the storage medium and the processor may be provided as a discrete component in the mobile station UE, the radio base station eNB, or the mobility management node MME.
以上、上述の実施形態を用いて本発明について詳細に説明したが、当業者にとっては、本発明が本明細書中に説明した実施形態に限定されるものではないということは明らかである。本発明は、請求の範囲の記載により定まる本発明の趣旨及び範囲を逸脱することなく修正及び変更態様として実施することができる。従って、本明細書の記載は、例示説明を目的とするものであり、本発明に対して何ら制限的な意味を有するものではない。
As described above, the present invention has been described in detail using the above-described embodiments. However, it is obvious for those skilled in the art that the present invention is not limited to the embodiments described in the present specification. The present invention can be implemented as modifications and changes without departing from the spirit and scope of the present invention defined by the description of the scope of claims. Therefore, the description of the present specification is for illustrative purposes and does not have any limiting meaning to the present invention.
なお、日本国特許出願第2012-148676号(2012年7月2日出願)の全内容が、参照により、本願明細書に組み込まれている。
Note that the entire contents of Japanese Patent Application No. 2012-148676 (filed on July 2, 2012) are incorporated herein by reference.
以上説明したように、本発明によれば、PWSにおいて、ネットワーク負荷の増大を回避しつつ、次々と異なる内容で送信される「Warning message」を移動局UEにおいて適切に受信することができる移動通信方法及び移動局を提供することができる。
As described above, according to the present invention, in the PWS, the mobile station UE can appropriately receive “Warning message” transmitted with different contents one after another while avoiding an increase in network load. A method and a mobile station can be provided.
UE…移動局
10…送信部
11…受信部
12…検証部
13…表示部 UE ...mobile station 10 ... transmission unit 11 ... reception unit 12 ... verification unit 13 ... display unit
10…送信部
11…受信部
12…検証部
13…表示部 UE ...
Claims (10)
- 無線基地局が、移動局に対して、警告情報及びカウンタと共に、該警告情報及び該カウンタに基づいて生成されたデジタル署名を通知する工程と、
前記移動局が、所定の公開鍵を用いて前記デジタル署名に対して検証処理を行うと共に、受信した前記カウンタと保持しているカウンタとを比較する工程と、
前記移動局が、前記検証処理に成功した場合で、かつ、受信した前記カウンタが、保持している前記カウンタと同じ或いは該カウンタよりも進んでいると判断した場合、受信した前記警告情報を表示する工程とを有することを特徴とする移動通信方法。 The wireless base station notifying the mobile station of the warning information and the counter together with the warning information and the digital signature generated based on the counter;
The mobile station performs a verification process on the digital signature using a predetermined public key, and compares the received counter with a held counter;
When the mobile station has succeeded in the verification process, and when the received counter determines that the received counter is the same as or more advanced than the held counter, the received warning information is displayed. And a mobile communication method. - 前記移動局が、アタッチ処理或いは位置登録処理において、前記カウンタ及び前記所定の公開鍵を受信して保持する工程を更に有することを特徴とする請求項1に記載の移動通信方法。 The mobile communication method according to claim 1, further comprising the step of the mobile station receiving and holding the counter and the predetermined public key in an attach process or a location registration process.
- 前記ネットワークが、所定タイミングで、報知情報を用いて、前記カウンタのみを更新する工程を更に有することを特徴とする請求項1に記載の移動通信方法。 The mobile communication method according to claim 1, wherein the network further includes a step of updating only the counter using broadcast information at a predetermined timing.
- 前記ネットワークが、所定タイミングで、報知情報を用いて、前記所定の公開鍵及び前記カウンタを更新する工程を更に有することを特徴とする請求項1に記載の移動通信方法。 The mobile communication method according to claim 1, further comprising the step of updating the predetermined public key and the counter by using broadcast information at a predetermined timing.
- 前記移動局は、前記報知情報を受信した場合、保持している前記カウンタを更新し、保持している前記所定の公開鍵については更新することなく前記検証処理に引き続き用いることを特徴とする請求項3に記載の移動通信方法。 The mobile station updates the held counter when the broadcast information is received, and continues to use the predetermined public key for the verification process without updating the counter. Item 4. The mobile communication method according to Item 3.
- 前記移動局は、前記報知情報を受信した場合、保持している前記所定の公開鍵及び前記カウンタを更新することを特徴とする請求項4に記載の移動通信方法。 The mobile communication method according to claim 4, wherein the mobile station updates the predetermined public key and the counter held when the broadcast information is received.
- 無線基地局から、警告情報及びカウンタと共に、該警告情報及び該カウンタに基づいて生成されたデジタル署名を受信するように構成されている受信部と、
所定の公開鍵を用いて、前記デジタル署名に対して検証処理を行うと共に、受信した前記カウンタと保持しているカウンタとを比較するように構成されている検証部と、
前記検証処理に成功した場合で、かつ、受信した前記カウンタが、保持している前記カウンタと同じ或いは該カウンタよりも進んでいると判断された場合、受信した前記警告情報を表示するように構成されている表示部とを具備することを特徴とする移動局。 A receiver configured to receive the warning information and a digital signature generated based on the counter, together with the warning information and the counter, from the radio base station;
A verification unit configured to perform a verification process on the digital signature using a predetermined public key, and to compare the received counter with a held counter;
The received warning information is displayed when the verification process is successful and when it is determined that the received counter is the same as or more advanced than the held counter. And a display unit. - 前記検証部は、アタッチ処理或いは位置登録処理において、前記カウンタ及び前記所定の公開鍵を受信して保持するように構成されていることを特徴とする請求項7に記載の移動局。 The mobile station according to claim 7, wherein the verification unit is configured to receive and hold the counter and the predetermined public key in an attach process or a location registration process.
- 前記検証部は、前記無線基地局から受信した報知情報に応じて、保持している前記カウンタを更新し、保持している前記所定の公開鍵については更新することなく前記検証処理に引き続き用いるように構成されていることを特徴とする請求項7に記載の移動局。 The verification unit updates the held counter according to the broadcast information received from the radio base station, and continues to use the held public key for the verification process without updating the predetermined public key. The mobile station according to claim 7, wherein the mobile station is configured as follows.
- 前記検証部は、前記無線基地局から受信した報知情報に応じて、保持している前記所定の公開鍵及び前記カウンタを更新するように構成されていることを特徴とする請求項7に記載の移動局。 The said verification part is comprised so that the said predetermined | prescribed public key and the said counter which are hold | maintained may be updated according to the alerting | reporting information received from the said wireless base station. Mobile station.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012-148676 | 2012-07-02 | ||
JP2012148676A JP5965749B2 (en) | 2012-07-02 | 2012-07-02 | Mobile communication method and mobile station |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014007172A1 true WO2014007172A1 (en) | 2014-01-09 |
Family
ID=49881928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/067872 WO2014007172A1 (en) | 2012-07-02 | 2013-06-28 | Mobile communication method and mobile terminal |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP5965749B2 (en) |
WO (1) | WO2014007172A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015143330A1 (en) * | 2014-03-20 | 2015-09-24 | Blackberry Limited | Method for validating messages |
WO2016197464A1 (en) * | 2015-06-11 | 2016-12-15 | 中兴通讯股份有限公司 | Information transmission monitoring method, storage medium, device and monitoring system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004186892A (en) * | 2002-12-02 | 2004-07-02 | Nec Infrontia Corp | Packet transmitting system and packet reception system |
WO2008065697A1 (en) * | 2006-11-27 | 2008-06-05 | Mitsubishi Electric Corporation | Wireless communication system, wireless communication terminal device and base station |
JP2010273225A (en) * | 2009-05-22 | 2010-12-02 | Fujitsu Ltd | Packet transmitting/receiving system, packet transmitting/receiving apparatus, and packet transmitting/receiving method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8792416B2 (en) * | 2006-06-19 | 2014-07-29 | Ntt Docomo, Inc. | Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station |
-
2012
- 2012-07-02 JP JP2012148676A patent/JP5965749B2/en not_active Expired - Fee Related
-
2013
- 2013-06-28 WO PCT/JP2013/067872 patent/WO2014007172A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004186892A (en) * | 2002-12-02 | 2004-07-02 | Nec Infrontia Corp | Packet transmitting system and packet reception system |
WO2008065697A1 (en) * | 2006-11-27 | 2008-06-05 | Mitsubishi Electric Corporation | Wireless communication system, wireless communication terminal device and base station |
JP2010273225A (en) * | 2009-05-22 | 2010-12-02 | Fujitsu Ltd | Packet transmitting/receiving system, packet transmitting/receiving apparatus, and packet transmitting/receiving method |
Non-Patent Citations (2)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security aspects of Public Warning System (PWS); (Release 12)", 3GPP TR 33.869, VO.0.2, June 2012 (2012-06-01), Retrieved from the Internet <URL:http:// www.3gpp.org/ftp/Specs/archive/33_series/33. 869/33869-002.zip> [retrieved on 20130722] * |
NTT DOCOMO: "PWS Replay Protection", 3GPP TDOCS (WRITTEN CONTRIBUTIONS) AT MEETING, 3 July 2012 (2012-07-03), pages S3 - 68, S3-120749, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS368Bratislava/Docs/S3-120749.zip> [retrieved on 20130722] * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015143330A1 (en) * | 2014-03-20 | 2015-09-24 | Blackberry Limited | Method for validating messages |
US9407444B2 (en) | 2014-03-20 | 2016-08-02 | Certicom Corp. | Method for validating messages |
KR20160135724A (en) * | 2014-03-20 | 2016-11-28 | 블랙베리 리미티드 | Method for validating messages |
CN106256111A (en) * | 2014-03-20 | 2016-12-21 | 黑莓有限公司 | For the method verifying message |
US10284377B2 (en) | 2014-03-20 | 2019-05-07 | Blackberry Limited | Method for validating messages |
CN106256111B (en) * | 2014-03-20 | 2019-11-08 | 黑莓有限公司 | Method for verifying message |
KR102366684B1 (en) * | 2014-03-20 | 2022-02-22 | 블랙베리 리미티드 | Method for validating messages |
WO2016197464A1 (en) * | 2015-06-11 | 2016-12-15 | 中兴通讯股份有限公司 | Information transmission monitoring method, storage medium, device and monitoring system |
Also Published As
Publication number | Publication date |
---|---|
JP2014011735A (en) | 2014-01-20 |
JP5965749B2 (en) | 2016-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2745931C (en) | Mobile communication method and radio base station | |
KR20220082836A (en) | Method and user terminal for determining whether a base station is Genuine or Loose in a wireless network | |
US20150156667A1 (en) | Mobile communication method, core network apparatus, radio access network apparatus, and mobile station | |
US20120083239A1 (en) | Broadcast information notification method and network node | |
JP5147450B2 (en) | Paging signal transmission method and mobile station | |
JP4820448B2 (en) | Notification signal transmission method and mobile station | |
US20150236851A1 (en) | Method and apparatus for updating ca public key, ue and ca | |
JP5965749B2 (en) | Mobile communication method and mobile station | |
CN106576241B (en) | Method for checking MIC in D2D communication and D2D communication system | |
JP5156460B2 (en) | Broadcast information notification method, mobile station and certification authority system | |
CN103220667A (en) | Method, device and system for verifying public warning system (PWS) signing information | |
JPWO2010053151A1 (en) | Mobile station and mobile communication method | |
JP6231278B2 (en) | Mobile station and radio base station | |
JP2010263587A (en) | Mobile communication method and mobile station | |
US20150296375A1 (en) | Methods, devices, and computer program products improving the public warning system for mobile communication | |
CN102843662B (en) | Transmission, update method and the relevant device of public warning system key updating information | |
JP2010200384A (en) | Mobile communication method | |
WO2012171392A1 (en) | Method and system for configuring public warning system key information in wireless communication system | |
WO2012174874A1 (en) | Method for sending and updating public warning system key update information and corresponding device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13813741 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13813741 Country of ref document: EP Kind code of ref document: A1 |