WO2004102883A1 - A kind of method to realize user authentication - Google Patents
A kind of method to realize user authentication Download PDFInfo
- Publication number
- WO2004102883A1 WO2004102883A1 PCT/CN2004/000497 CN2004000497W WO2004102883A1 WO 2004102883 A1 WO2004102883 A1 WO 2004102883A1 CN 2004000497 W CN2004000497 W CN 2004000497W WO 2004102883 A1 WO2004102883 A1 WO 2004102883A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- eap
- uim
- client
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Definitions
- the present invention relates to authentication technology between a user and a network, and in particular, it includes at least
- the RFC2284 document defines an extended authentication protocol for the point-to-point (PPP) protocol, namely the extended authentication (EAP) protocol.
- This protocol can be extended on the basis of the EAP protocol to support other authentication mechanisms and provide end-to-end authentication methods.
- the intermediate device does not need to adopt a specific authentication mechanism. In detail, when the authentication is performed between the authentication client and the authentication server, the authentication mechanism carried by both parties on the EAP protocol can be adopted, and no intermediate device is required to support it.
- the EAP authentication protocol is defined differently according to different bearer types.
- the EAP authentication protocol is carried on the PPP protocol, called EAPoPPP; the EAP authentication protocol is carried on the Remote Access Dial-In User Service (RADIUS) protocol, called EAPoRadius; the EAP authentication protocol is used on the 802.1x protocol, called EAPoL.
- EAPoPPP PPP protocol
- EAP authentication protocol is carried on the Remote Access Dial-In User Service (RADIUS) protocol, called EAPoRadius
- EAP authentication protocol is used on the 802.1x protocol, called EAPoL.
- the EAP authentication protocol message includes four fields: a code, a code, an identifier, a length, a data, and a type.
- the Data field includes two types: Type and TypeData. Each field is transmitted from left to right during transmission.
- the Code field occupies one byte and is used to identify the type of the EAP packet. As shown in Table 1, this domain has four types of values, where 1 represents the Request domain, 2 represents the Response domain, 3 represents the Success domain, and 4 represents the Failure domain. Type value meaning
- the Identifier field occupies one byte and is used to match the Request message and the Response message.
- the Length field occupies two bytes and is used to indicate the length of the EAP packet. It includes four fields: Code, Identifier, Length, and Data.
- the Data field occupies zero or more bytes. This field uses a format related to the Code field type value.
- Type field occupies one byte and mainly defines various authentication mechanisms. The Type field appears only in Request and Response messages. In RFC 2284, Type can be six types: Identity, Notification, Nak :, MD5 (MD5 -Challenge), One-Time Password, and Smart Card (Generic Token Card). .
- the type value is 1 for Identity; the type value is 2 for Notification; the type value is 3 for Nak; the type value is 4 for MD5-Challenge; the type value is 5 for One-Time Password; the type value is 6 means Generic Token Card.
- the type values of 1, 2, 4, 5, and 6 are applicable to Requset and Respone, and the type value of 3 is only applicable to Response messages.
- Identity is used to query the identity of the user. Each Request request of the Identity type must correspond to a Response response of the Identity type.
- Notification is used by the device to send a displayable message to the client.
- the client should display this message to the user, and if it cannot display it, log it. Every A Notification request message must correspond to a Notification response message.
- Nak is only applicable to Response packets.
- a Nak-type Response message should be sent.
- MD5-Challenge is similar to MD5 in CHAP protocol.
- the MD5-Challenge type Request request message includes a Challenge message.
- Each MD5-Challenge type Request request message must correspond to a MD5-Challenge type or Nak type Response response message.
- One-Time Password type Request request contains one OTP Challenge request request.
- One One-Time Password type response message must correspond to one One-Time Password type or ak type.
- the Generic Token Card type is defined to require users to enter various Token Card information.
- the Generic Token Card type Request request message contains an ASCII text message, and the corresponding Generic Token Card type Response response message contains the relevant Token Card information required for authentication. This information is usually read by the user from the Token Card device and entered in ACSII text.
- TypeData this field occupies zero or more bytes, and is related to the type value of the Type field Format.
- the client and the authentication point are the mobile switching center (MSC) / visit location register (VLR) and medium access register (HLR) / authentication center (AC) on the network side.
- MSC mobile switching center
- VLR visit location register
- HLR medium access register
- AC authentication center
- SSD shared secret data
- A-key is stored in the terminal and HLR / AC, which is used to update the SSD.
- the authentication result is calculated by using the parameters such as SSD, random number, electronic serial number (ESN), and mobile station identification number (MIN) through the cellular authentication and voice encryption (CAVE) algorithm, and the MSC / VLR or HLR /
- the AC compares whether the authentication results are consistent. If they are not consistent, the system will initiate an SSD update. After the SSD update is successful, that is, the SSDs on the terminal side and the network side remain consistent. The next time the user accesses, the authentication result calculated by the user terminal using the SSD should be Consistent with the authentication results calculated in HLR / AC, authentication can be successful.
- an object of the present invention is to provide a method for implementing user authentication, so as to implement user authentication in a multi-mode network including at least an IS95 / CDMA2000 lx network, and Low cost and easy maintenance.
- a method for implementing user authentication is applied to a multi-mode network including at least an IS95 / CDMA2000 lx network, and the method includes:
- the authentication point is a non-IS95 / CDMA2000 lx network in a multi-mode network;
- the client uses the user information in the UIM as the user identity, and performs EAP-UIM authentication with the authentication point.
- the EAP protocol described in step A is set to a message code (Code), an identifier (Identifier), a length (Length), and data (Data), and the Data further includes a type (Type) and a data type (TypeData).
- the Type is set to seven types including Identity, Notification Nak, MD5-Challenge, One-Time Password, Generic Token Card, and UIM.
- the values from 1 to 6 correspond to the set Type.
- the Type is UIM, and the value can be any value greater than 6.
- the TypeData is set to include three fields: Type, Length, and Data.
- the Type, Length, and Data values are greater than or equal to 1 and less than or equal to 255, and the Type, Length, and Data values are not equal.
- the step B further includes:
- the client sends the user identity to the authentication point.
- the authentication point generates a random number for authenticating the client according to the user identity, and calculates a corresponding first authentication number according to the random number and the shared secret data (SSD) contained in the authentication point to form an authentication set.
- SSD shared secret data
- the client calculates a corresponding second authentication number according to the random number and the SSD of the client.
- the authentication point compares whether the first authentication number is consistent with the second authentication number. If they are the same, the authentication succeeds; otherwise, the authentication fails.
- Step B1 further includes:
- the authentication point sends a client request user identity (EAP-Request / Identity) message to the client, asking the client to send its own identity;
- EAP-Request / Identity client request user identity
- the client sends the user identity to the authentication point through an identity response (EAP-Response / Identity).
- the authentication point After receiving the EAP-Response / Identity message, the authentication point sends an EAP-Request / UIM / Start message to the client to start EAP-UIM authentication.
- EAP-Request / UIM / Start After receiving the EAP-Request / UIM / Start message, the client sends an EAP-UIM authentication protocol start response (EAP-Response / UIM / Start) message to the authentication point.
- EAP-UIM authentication protocol start response EAP-Response / UIM / Start
- Step B14 further includes:
- the authentication point After receiving the EAP-Response / UIM / Start message, the authentication point sends an EAP-UIM authentication protocol authentication request (EAP-Request / UIM / Challenge) message to the client, and sends the random number obtained from the authentication server to the client. end.
- EAP-UIM authentication protocol authentication request EAP-Request / UIM / Challenge
- Step B3 further includes: the client sends the second authentication number calculated by itself to the authentication point through an EAP-UIM authentication protocol authentication response (EAP-Response / UIM / Challenge) message.
- EAP-UIM authentication protocol authentication response EAP-Response / UIM / Challenge
- the method further includes:
- step E Update the SSDs in the client and the authentication server to ensure that the SSDs at both ends are equal, and then return to step B for execution.
- the invention implements the IS95 / CDMA2000 lx network to authenticate users using the IS95 / CDMA2000 lx network by expanding the EAP authentication protocol. This method can reduce cost investment, authentication security, and convenient maintenance. 4 / ⁇ 0 0 Brief description of the drawings
- FIG. 1 is a schematic diagram of an EAP protocol message format in the prior art
- FIG. 2 is a schematic flowchart of implementing the method of the present invention
- FIG. 3 is a schematic flowchart of a specific embodiment of performing first authentication according to the present invention.
- FIG. 4 is a schematic flowchart of a specific embodiment for performing an authentication according to the present invention. Mode of Carrying Out the Invention
- the core content of the present invention is:
- a user identity recognition module (UIM) in an IS95 / CDMA2000 lx network is used to authenticate non-IS95 / CDMA2000 lx network users.
- UIM is not only used in CDMA IS95 and CDMA 2000 lx networks, but also in other networks, such as WLAN networks and CDMA EVDO networks. When it is used in these networks, an authentication protocol is needed to carry its authentication mechanism.
- the networking structure for implementing the present invention includes a client, an authentication point, and an authentication server.
- the authentication server indicates that the network can terminate the communication between the EAP protocol and the authentication point through the AAA protocol, such as the communication through the Radius protocol.
- the authentication server can communicate with the CDMA network and can obtain the authentication set from the HLR of the CDMA network; the authentication point and the authentication server can communicate through the existing AAA communication protocol, such as the Radius protocol;
- the client Refers to the terminal that contains the UIM module. It includes two cases. One is that the terminal and the UIM module are not separated, that is, the case where the machine card is not separated. The other is that the terminal and the UIM module are separated. Communication through the relevant interface, that is, the normal machine-card separation state.
- the method for implementing the present invention includes the following steps:
- Step 201 preset an EAP protocol supporting the client and the authentication point to use UIM for authentication
- Step 202 The client uses the user information in the UIM as the user identity, and starts EAP-UIM authentication with the authentication point.
- Step 203 The authentication point generates a random number for authenticating the user terminal according to the user identity, and calculates a corresponding first authentication number according to the random number and the SSD contained in the authentication point to form an authentication set.
- Step 204 The client calculates a corresponding second authentication number according to the random number and the SSD of the client.
- Step 205 The authentication point compares whether the first authentication number and the second authentication number are consistent. If they are the same, the authentication succeeds; otherwise, the authentication fails.
- the invention is extended on the EAP authentication protocol to generate a new authentication protocol EAP-UIM.
- the authentication protocol format of the present invention includes four parts: Code, Identifier, Length, and Data, where Data includes two types: Type and TypeData, which is the same as the prior art. However, the Type parameter and TypeData parameter are different from the prior art.
- TYPE field of the EAP protocol in the prior art, and the value can be a value greater than 6, which can be applied to Requset and Respone messages. For example, if the TYPE field is defined as 31, it indicates that the packet type adopts the EAP-UIM protocol.
- the TYPE-DATA field includes three types: Type and Lengths Value.
- the TYPE field is used to indicate the message type of the EAP-UIM protocol. As shown in Table 3, three types of values are specified in this embodiment; the Length field is used to describe the length of the EAP-UIM message, and specifically includes the length of the Type, Length, and Data fields; the Value field uses the type value of the Type field Related formats. Value
- the method of using UIM to authenticate users is the same as the method of user authentication in CDMA IS95 / CDMA 2000 lx networks in the prior art.
- the first authentication fails in the first authentication, mainly due to the user terminal side and the network side. Due to inconsistent SSDs, after an authentication failure, an SSD update operation needs to be performed to make the SSDs at both ends consistent.
- Step 301 The authentication point sends a client request user identity (EAP-Request / Identity) message to the client, and requires the client to send its own identity;
- EAP-Request / Identity client request user identity
- Step 302 The client obtains the identity information stored in the UIM, uses the identity information as the user identity, and sends the user identity to the authentication point in response to a user identity (EAP-Response / Identity) message.
- EAP-Response / Identity user identity
- Step 303 After receiving the EAP-Response Identity message, the authentication point sends an EAP-UIM authentication protocol start request (EAP-Request / UIM / Start) message to the client to start the EAP-UIM authentication protocol process.
- EAP-Request / UIM / Start EAP-UIM authentication protocol start request
- the authentication point uses the extended protocol request to obtain the user identity.
- the TYPE and TYPEDATE parameters in the extended protocol will also be used to transmit the EAP-UIM authentication information between the client and the authentication point.
- Step 304 After receiving the EAP-Request / UIM / Start message, the client returns an EAP-UIM authentication protocol start response (EAP-Response / UIM / Start) message to the authentication point; step 305 '.
- the authentication point receives After EAP-Response / UIM / Start, it passes the authentication service
- the W server exchanges to obtain an authentication set of a random number (rand) and its corresponding second authentication number (AUTH2), and then sends an EAP-UIM authentication protocol authentication request (EAP-Request / UIM / Challenge) report to the client.
- the document contains a random number.
- the process by which the authentication server obtains an authentication set is as follows: a random number is generated according to the user identity, and the corresponding second authentication number is calculated according to the SSD stored on the network side;
- Step 306 After receiving the EAP-Request / UIM / Challenge message, the client encrypts the SSD stored in Rand and UIM to obtain the first authentication number (AUTH1), and then updates the response message through the EAP-UIM authentication protocol.
- the text (EAP-Response UIM / Challenge) is sent to the authentication point, and the message carries AUTH1;
- Step 307 After receiving the EAP-Response / UIM / Challenge message, the authentication point will compare the authentication server with AUTH1 and the AUTH2 saved by itself. If they are the same, the authentication point will notify the authentication point of success, otherwise, the authentication will fail and then authenticate. Click to determine whether the Update process is required. If necessary, start the Update process, update the SSD, and perform step 308; otherwise, the authentication fails and the process exits.
- Step 308 The authentication point obtains an SSD authentication random number (RANDSSD) and its corresponding authentication number.
- the authentication number is calculated according to the network side and the RANDSSD, and then the authentication point sends an EAP-UIM authentication protocol update response to the client.
- Text (EAP-Request / UIM / Update) message which contains an SSD authentication random number (RANDSSD);
- Step 309 After receiving the EAP-Request UIM / Update message, the client calculates the corresponding authentication number according to the RANDSSD and the SSD saved by the client, and sends an EAP-UIM authentication protocol authentication response (EAP-Respnse) to the authentication point. / UIM / Challenge) packet, which contains the authentication number calculated by the client;
- EAP-Respnse EAP-UIM authentication protocol authentication response
- Step 310 After receiving the EAP-Respnse / UIM / Challenge message, the authentication point determines whether the authentication numbers calculated by the network side and the client are the same. If they are the same, the client returns a EAP-UTM authentication protocol authentication request (EAP-Request / UIM / Challenge), otherwise, the SSD update fails;
- Step 311 After receiving the EAP-Request / UIM / Challenge, the client updates its SSD, and sends the calculated SSD to the authentication point through an EAP-Response / UIM / Update message.
- Step 312 After receiving the EAP-Response / UIM / Update, the authentication point updates the SSD on the network side to determine whether the SSD is updated. If the update is completed, the Update process is ended, and an EAP-Request / UIM / Challenge message is sent to the client. Re-certify;
- Step 313 After receiving the EAP-Request / UIM / Challenge message, the client returns an EAP-Response / UIM / Challenge message to the authentication point.
- Step 314 After the authentication point judges that the authentication is successful according to the EAP-Response / UIM / Challenge, it sends an EAP-Success message to the client;
- the certification process for non-first certification is as follows:
- Step 401 The authentication point sends an EAP-Request / Identity message to the client, requesting the client to send its own identity;
- Step 402 After receiving the EAP-Request / Identity message, the client uses the identity information stored in the UIM as the user identity, and sends the user identity to the authentication point through the EAP-Response / Identity message;
- Step 403 After receiving the EAP-Response / Identity message, the authentication point sends an EAP-Request / UIM / Start message to the client to start the EAP-UIM authentication protocol.
- Step 405 After the authentication point receives the EAP-Response / UIM / Start message, it sends a message from the authentication server.
- the Rand obtained by the server and the corresponding second authentication number (AUTH2), and then sends the Rand to the client through the EAP-Request / UIM / Challenge message; the second authentication number is based on the random number and saved on the network side. Calculated by the SSD;
- Step 406 After receiving the EAP-Request / UIM / Challenge message, the client encrypts the password stored in Rand and UIM to obtain AUTH1, and the client sends the EAP-Response / UIM / Challenge message to the authentication point. Where the message carries AUTH1;
- Step 407 After receiving the EAP-Response / UIM / Challenge message, the authentication point sends the received message to the authentication server through the AAA communication protocol with the authentication server.
- the authentication server compares AUTH1 with AUTH2 stored by itself. If they are consistent, the authentication point is notified of success, and then the authentication point sends an EAP-Success message to the client to notify the client of successful authentication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN03131038.9 | 2003-05-16 | ||
| CNA031310389A CN1549494A (zh) | 2003-05-16 | 2003-05-16 | 一种实现用户认证的方法 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2004102883A1 true WO2004102883A1 (en) | 2004-11-25 |
Family
ID=33438173
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2004/000497 Ceased WO2004102883A1 (en) | 2003-05-16 | 2004-05-17 | A kind of method to realize user authentication |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN1549494A (zh) |
| WO (1) | WO2004102883A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2433882A1 (de) | 2010-09-22 | 2012-03-28 | TGW Mechanics GmbH | Verfahren zum Einlagern von Waren sowie Vorrichtung dazu |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100770928B1 (ko) * | 2005-07-02 | 2007-10-26 | 삼성전자주식회사 | 통신 시스템에서 인증 시스템 및 방법 |
| CN101110673B (zh) * | 2006-07-17 | 2011-02-02 | 华为技术有限公司 | 利用一次eap过程执行多次认证的方法和装置 |
| CN100423609C (zh) * | 2006-08-01 | 2008-10-01 | 中国移动通信集团公司 | 一种接入移动通信装置的方法 |
| CN101203030B (zh) * | 2006-12-13 | 2010-10-06 | 联想(北京)有限公司 | 一种利用移动终端多模协议栈进行鉴权的装置和方法 |
| CN101431508B (zh) * | 2007-11-06 | 2012-05-23 | 华为技术有限公司 | 一种网络认证方法、系统及装置 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1001641A2 (en) * | 1998-11-09 | 2000-05-17 | Lucent Technologies Inc. | Secure method for generating cryptographic function outputs |
| KR20020047589A (ko) * | 2000-12-13 | 2002-06-22 | 이계철 | 무선통신 단말기를 이용한 출입 통제 방법 |
| CN1486029A (zh) * | 2002-09-23 | 2004-03-31 | 华为技术有限公司 | 基于远程认证的网络中实现eap认证的方法 |
-
2003
- 2003-05-16 CN CNA031310389A patent/CN1549494A/zh active Pending
-
2004
- 2004-05-17 WO PCT/CN2004/000497 patent/WO2004102883A1/zh not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1001641A2 (en) * | 1998-11-09 | 2000-05-17 | Lucent Technologies Inc. | Secure method for generating cryptographic function outputs |
| KR20020047589A (ko) * | 2000-12-13 | 2002-06-22 | 이계철 | 무선통신 단말기를 이용한 출입 통제 방법 |
| CN1486029A (zh) * | 2002-09-23 | 2004-03-31 | 华为技术有限公司 | 基于远程认证的网络中实现eap认证的方法 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2433882A1 (de) | 2010-09-22 | 2012-03-28 | TGW Mechanics GmbH | Verfahren zum Einlagern von Waren sowie Vorrichtung dazu |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1549494A (zh) | 2004-11-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11895157B2 (en) | Network security management method, and apparatus | |
| CN100539521C (zh) | 一种实现无线局域网鉴权的方法 | |
| JP5199405B2 (ja) | 通信システムにおける認証 | |
| CA2490131C (en) | Key generation in a communication system | |
| US8094821B2 (en) | Key generation in a communication system | |
| WO2011017924A1 (zh) | 无线局域网的认证方法、系统、服务器和终端 | |
| WO2004102875A1 (en) | A method for performing authentication of high rapidity packet data | |
| CN109391937A (zh) | 公钥的获取方法、设备及系统 | |
| CN1327648C (zh) | 一种实现高速率分组数据业务认证的方法 | |
| WO2004102883A1 (en) | A kind of method to realize user authentication | |
| CN101203030B (zh) | 一种利用移动终端多模协议栈进行鉴权的装置和方法 | |
| CN101160784A (zh) | 一种密钥更新协商方法及装置 | |
| CN119652537A (zh) | 一种网络设备认证方法、装置、设备及介质 | |
| HK1072849B (zh) | 一种实现高速率分组数据业务认证的方法 | |
| HK1085027B (zh) | 通信系統中的認證 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 122 | Ep: pct application non-entry in european phase |
