[go: up one dir, main page]

TWI451783B - A gsm roaming authentication method - Google Patents

A gsm roaming authentication method Download PDF

Info

Publication number
TWI451783B
TWI451783B TW101100670A TW101100670A TWI451783B TW I451783 B TWI451783 B TW I451783B TW 101100670 A TW101100670 A TW 101100670A TW 101100670 A TW101100670 A TW 101100670A TW I451783 B TWI451783 B TW I451783B
Authority
TW
Taiwan
Prior art keywords
code
access terminal
authentication
new access
key
Prior art date
Application number
TW101100670A
Other languages
Chinese (zh)
Other versions
TW201330663A (en
Inventor
Tzone Lih Hwang
Original Assignee
Univ Nat Cheng Kung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Cheng Kung filed Critical Univ Nat Cheng Kung
Priority to TW101100670A priority Critical patent/TWI451783B/en
Priority to US13/734,235 priority patent/US8855604B2/en
Publication of TW201330663A publication Critical patent/TW201330663A/en
Application granted granted Critical
Publication of TWI451783B publication Critical patent/TWI451783B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

GSM漫遊認證方法GSM roaming authentication method

本發明係關於一種GSM通訊認證方法,尤其是一種用於開放式通道之GSM漫遊認證方法。The invention relates to a GSM communication authentication method, in particular to a GSM roaming authentication method for an open channel.

由於全球行動通訊系統(Global System for Mobile Communication,GSM)採用數位調變、身分認證及訊息加密等機制,相較於採用類比調變的通訊系統,具有保密性高、系統服務容量增加、可傳輸數據資料等優點,因此,已廣泛地使用在歐洲及其他全球各地。Since the Global System for Mobile Communication (GSM) adopts mechanisms such as digital modulation, identity authentication and message encryption, it has high confidentiality, increased system service capacity, and can be transmitted compared to a communication system using analog modulation. Data and other advantages, therefore, have been widely used in Europe and other parts of the world.

請參閱第1圖所示,其係習知GSM架構之系統示意圖,其中,習知GSM通訊系統9包含一使用端(Mobile Station)91、一新訪問端(New Visitor Location Register,New VLR)92a、一舊訪問端(Old Visitor Location Register,Old VLR)92b及一歸屬端(Home Location Register,HLR)93,該新訪問端92a耦接該使用端91及該舊訪問端92b,該歸屬端93耦接該舊訪問端92b,其中,假設該新訪問端92a與該舊訪問端92b之間的傳輸通道為安全通道(secure channel)SC,且該舊訪問端92b與該歸屬端93之間的傳輸通道為安全通道SC,且該新訪問端92a與該舊訪問端92b互為信賴方。Please refer to FIG. 1 , which is a schematic diagram of a system of the conventional GSM architecture. The conventional GSM communication system 9 includes a mobile station 91 and a new visitor register (New VLR) 92a. An Old Visitor Location Register (Old VLR) 92b and a Home Location Register (HLR) 93. The new access terminal 92a is coupled to the user terminal 91 and the old access terminal 92b. The home terminal 93 The old access end 92b is coupled to the old access end 92b, and the transmission channel between the new access end 92a and the old access end 92b is assumed to be a secure channel SC, and the old access end 92b and the home end 93 are The transmission channel is a secure channel SC, and the new access terminal 92a and the old access terminal 92b are mutually trusted parties.

當該使用端91由該舊訪問端92b的通訊範圍移動至該新訪問端92a的通訊範圍時,該使用端91將改向該訪問端92a請求提供漫遊(roaming)服務時,須進行習知GSM漫遊認證方法,先由該使用端91向該新訪問端92a請求提供服務,該新訪問端92a須向該舊訪問端92b取得一鑑別資料(即n組{RAND,SRES,Kc}),並由該鑑別資料中選取一亂數碼RAND傳送至該使用端91,待該使用端91以該亂數碼RAND產生一認證簽署碼SRES’後,將該認證簽署碼SRES’傳送至該新訪問端92a進行確認。藉此,該新訪問端92a可以認證(authenticate)該使用端91之身份是否合法,並提供合法之使用端91所需的漫遊服務。When the user end 91 moves from the communication range of the old access terminal 92b to the communication range of the new access terminal 92a, the use terminal 91 will redirect to the access terminal 92a to request roaming service. In the GSM roaming authentication method, the user 91 first requests the new access terminal 92a to provide a service, and the new access terminal 92a must obtain an authentication data (ie, n groups {RAND, SRES, Kc}) from the old access terminal 92b. And the illegible digital RAND is selected from the authentication data and sent to the user terminal 91. After the user terminal 91 generates an authentication sign code SRES' by the garbled digital RAND, the authentication signing code SRES' is transmitted to the new access terminal. 92a confirms. Thereby, the new access terminal 92a can authenticate the identity of the user 91 and provide the roaming service required by the legitimate user 91.

惟,由於該新訪問端92a及該舊訪問端92b之間需滿足互為信賴方及安全通道等假設,且該新訪問端92a與該舊訪問端92b之間的資料(例如:該鑑別資料等)係以明文方式傳輸,當該使用端91、該新訪問端92a及該舊訪問端92b之間的資料經由開放式通道(或稱公眾通道)傳遞時,並無法滿足上述互為信賴方及安全通道等假設,因此,習知GSM漫遊認證方法並無法用於開放式通道,而且,所傳輸的資料可能面臨來自其他通訊系統的威脅,例如:干擾、攔截、竊聽或欺騙等。The information between the new access terminal 92a and the old access terminal 92b and the old access terminal 92b (for example, the authentication data) is required to be satisfied between the new access terminal 92a and the old access terminal 92b. The data is transmitted in a clear text. When the data between the user terminal 91, the new access terminal 92a, and the old access terminal 92b is transmitted through an open channel (or a public channel), the above-mentioned mutually trusted parties cannot be satisfied. As well as the assumption of a secure channel, the conventional GSM roaming authentication method cannot be used for open channels, and the transmitted data may face threats from other communication systems, such as interference, interception, eavesdropping or fraud.

再者,習知GSM漫遊認證方法須滿足互為信賴方及安全通道等假設,上述假設並無法相容於異質性通訊系統(例如:不同通訊系統);且通訊距離增加將提高資料面臨上述威脅之風險,因此,該新訪問端92a對該使用端91進行認證時,僅適用於同質性通訊系統(例如:同為GSM通訊系統)及短距離通訊,因此,無法於異質性通訊系統及長距離通訊,使習知GSM漫遊認證方法之適用範圍受限。Furthermore, the conventional GSM roaming authentication method must satisfy the assumptions of mutual trust and secure channel. The above assumptions are not compatible with heterogeneous communication systems (for example, different communication systems); and the increase of communication distance will increase the data to face the above threats. Therefore, when the new access terminal 92a authenticates the user terminal 91, it is only applicable to the homogenous communication system (for example, the same GSM communication system) and short-distance communication, and therefore cannot be heterogeneous communication system and long. Distance communication limits the scope of application of the conventional GSM roaming authentication method.

另,由於該使用端91的運算能力有限,因此,針對習知GSM漫遊認證方法進行改良時,必須降低該使用端91的運算量,同時,必須與習知GSM通訊協定之漫遊認證方法相容。In addition, since the computing power of the user terminal 91 is limited, when the conventional GSM roaming authentication method is improved, the computing amount of the using terminal 91 must be reduced, and at the same time, it must be compatible with the conventional GSM communication protocol roaming authentication method. .

綜上所述,習知GSM漫遊認證方法不僅需要滿足互為信賴方及安全通道等假設,在實際使用時更衍生諸多限制與缺點,確有不便之處,亟需進一步改良,提升其實用性。In summary, the conventional GSM roaming authentication method not only needs to satisfy the assumptions of mutual trust and secure channel, but also has many limitations and shortcomings in actual use. It is inconvenient and needs further improvement to improve its practicability. .

本發明的目的乃改良上述之缺點,以提供一種GSM漫遊認證方法,藉由新訪問端及舊訪問端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於開放式通道傳輸資料者。The object of the present invention is to improve the above-mentioned shortcomings, and to provide a GSM roaming authentication method, in which a new access terminal and an old access terminal jointly share a shared key as a basis for data authentication of both parties, and is suitable for an open channel transmission data. .

本發明之次一目的,係提供一種GSM漫遊認證方法,藉由新訪問端及舊訪問端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於異質性通訊系統者。A second object of the present invention is to provide a GSM roaming authentication method, in which a new access terminal and an old access terminal jointly share a shared key as a basis for data authentication of both parties, and is applicable to a heterogeneous communication system.

本發明之另一目的,係提供一種GSM漫遊認證方法,藉由新訪問端及舊訪問端共同擁有一共享金鑰,作為雙方資料鑑別之依據,而適用於長距離通訊者。Another object of the present invention is to provide a GSM roaming authentication method, in which a new access terminal and an old access terminal jointly share a shared key as a basis for data authentication of both parties, and is applicable to long-distance correspondents.

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端將一暫時身分碼傳送至一新訪問端,用以向該新訪問端請求提供漫遊服務;一詢問程序,係由該新訪問端產生一挑戰碼,並將該挑戰碼及該暫時身分碼傳送至一舊訪問端;一回應程序,係由該舊訪問端確認該暫時身分碼,再以該挑戰碼、一鑑別資料、一國際身分碼及一共享金鑰產生一回應碼,並將該回應碼傳送至該新訪問端;一通知程序,係由該新訪問端以該共享金鑰確認該回應碼,並將該亂數碼序列之一亂數碼傳送至該使用端;及一認證程序,係由該使用端以一加密金鑰及該亂數碼產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端,由該新訪問端確認該認證簽署碼,以作為提供漫遊服務之依據。A GSM roaming authentication method includes: a requesting procedure, wherein a temporary identity code is transmitted by a user to a new access terminal for requesting a roaming service to the new accessing end; an inquiry procedure is performed by the new The access terminal generates a challenge code, and transmits the challenge code and the temporary identity code to an old access terminal; in a response procedure, the old access terminal confirms the temporary identity code, and then uses the challenge code, an authentication data, An international identity code and a shared key generate a response code, and transmit the response code to the new access terminal; a notification procedure, the new access terminal confirms the response code with the shared key, and the mess One of the digital sequences is transmitted to the user terminal; and an authentication program is generated by the user end by using an encryption key and the random number to generate an authentication signature code, and transmitting the authentication signature code to the new access terminal. The new signing code is confirmed by the new accessor as a basis for providing roaming services.

其中,該挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The challenge code is a randomly generated random number, a time stamp generated over time, or a serial number sequentially generated.

其中,該通知程序係由該新訪問端確認該回應碼中的挑戰碼與該新訪問端所傳送之挑戰碼是否相對應。The notification procedure is performed by the new access end to confirm whether the challenge code in the response code corresponds to the challenge code transmitted by the new access terminal.

其中,該通知程序係由該新訪問端確認該挑戰碼無誤後,儲存該鑑別資料及該國際身分碼。The notification program stores the authentication data and the international identity code after the new access terminal confirms that the challenge code is correct.

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端產生一第一挑戰碼,再將該第一挑戰碼及一暫時身分碼傳送至一新訪問端,用以向該新訪問端請求提供漫遊服務;一詢問程序,係由該新訪問端產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該暫時身分碼傳送至一舊訪問端;一回應程序,係由該舊訪問端確認該暫時身分碼,再以該第二挑戰碼、一鑑別資料、一國際身分碼、一認證金鑰及一共享金鑰產生一回應碼,再將該回應碼傳送至該新訪問端;一通知程序,係由該新訪問端以該共享金鑰確認該回應碼,再以該第一挑戰碼及該認證金鑰產生一認證碼,再將該認證碼及該亂數碼序列之一亂數碼傳送至該使用端;及一認證程序,係由該使用端產生該認證金鑰,並以該認證金鑰確認該認證碼,再以該加密金鑰及該亂數碼產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端,由該新訪問端確認該認證簽署碼,以作為提供漫遊服務之依據。A GSM roaming authentication method includes: a requesting procedure, wherein a first challenge code is generated by a user, and the first challenge code and a temporary identity code are transmitted to a new access terminal for accessing the new access The end requesting to provide a roaming service; a query procedure, the second access code is generated by the new access terminal, and the first challenge code, the second challenge code and the temporary identity code are transmitted to an old access terminal; The program confirms the temporary identity code by the old access terminal, and generates a response code by using the second challenge code, an authentication data, an international identity code, an authentication key and a shared key, and then the response code Transmitting to the new access terminal; a notification procedure, the new access terminal confirms the response code with the shared key, and then generates an authentication code by using the first challenge code and the authentication key, and then the authentication code and One of the chaotic digital sequences is transmitted to the user terminal; and an authentication program is generated by the user terminal, and the authentication key is confirmed by the authentication key, and the encryption key and the mess are used. Digital generation and certification And the signing of the new authentication code is transmitted to the access terminal, confirmed by the end of the certification signed new access code as a basis of providing roaming services.

其中,該第一挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The first challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated.

其中,該第二挑戰碼為隨機產生之亂數、隨時間產生之時戳或依序產生之序號。The second challenge code is a randomly generated random number, a time stamp generated over time, or a sequence number sequentially generated.

其中,該通知程序係由該新訪問端確認該回應碼中的第二挑戰碼與該新訪問端所傳送之第二挑戰碼是否相對應。The notification procedure is to confirm, by the new access terminal, whether the second challenge code in the response code corresponds to the second challenge code transmitted by the new access terminal.

其中,該使用端係以該第一挑戰碼及該加密金鑰產生該認證金鑰。The user end generates the authentication key by using the first challenge code and the encryption key.

其中,該使用端係將該第一挑戰碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證金鑰。The use end generates the authentication key by operating the first challenge code and the encryption key according to a hash function.

其中,該新訪問端確認該第二挑戰碼無誤後,儲存該鑑別資料、該國際身分碼及該認證金鑰。After the new access terminal confirms that the second challenge code is correct, the authentication data, the international identity code, and the authentication key are stored.

其中,該舊訪問端儲存該鑑別資料、該國際身分碼及該認證金鑰。The old access terminal stores the authentication data, the international identity code, and the authentication key.

其中,該使用端係將該亂數碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證簽署碼。The use end generates the authentication signature code by computing the chaotic digital and the encryption key according to a hash function.

其中,該通知步驟係由該亂數碼序列之中選取一個未使用過的亂數碼。The notification step is to select an unused random number from the random number sequence.

為讓本發明之上述及其他目的、特徵及優點能更明顯易懂,下文特舉本發明之較佳實施例,並配合所附圖式,作詳細說明如下:本發明全文所述之「使用端」(Mobile Station,MS),係指GSM通訊系統中,可以供使用者隨身攜帶之行動收發訊號裝置(即手機,Mobile Phone),係本發明所屬技術領域中具有通常知識者可以理解。The above and other objects, features and advantages of the present invention will become more <RTIgt; "Mobile Station" (MS) refers to an action transceiver device (ie, a mobile phone) that can be carried by a user in a GSM communication system, which can be understood by those of ordinary skill in the art to which the present invention pertains.

本發明全文所述之「新訪問端」(New Visitor Location Register,New VLR),係指GSM通訊系統中,提供使用端新的漫遊相關服務內容之訪問者位置暫存系統或網路,係本發明所屬技術領域中具有通常知識者可以理解。The "New Visitor Location Register" (New VLR) as used throughout the present invention refers to a visitor location temporary storage system or network that provides new roaming related service content in the GSM communication system. It will be understood by those of ordinary skill in the art to which the invention pertains.

本發明全文所述之「舊訪問端」(Old Visitor Location Register,Old VLR),係指GSM通訊系統中,提供使用端原有漫遊相關服務內容之訪問者位置暫存系統或網路,係本發明所屬技術領域中具有通常知識者可以理解。The Old Visitor Location Register (Old VLR) in the GSM communication system refers to a visitor location temporary storage system or network that provides the original roaming related service content of the user terminal. It will be understood by those of ordinary skill in the art to which the invention pertains.

本發明全文所述之「歸屬端」(Home Location Register,HLR),係指GSM通訊系統中,可以提供使用端註冊或登錄相關服務內容之歸屬者位置暫存系統或網路,係本發明所屬技術領域中具有通常知識者可以理解。The "Home Location Register" (HLR) described in the full text of the present invention refers to a MME communication system, which can provide a subscriber location registration system or network for registering or logging in to the relevant service content, which belongs to the present invention. Those of ordinary skill in the art will understand.

本發明全文所述之「耦接」(coupling),係指二裝置之間藉由有線實體、無線媒介或其組合等方式,而使該二裝置之資料可以相互傳遞,係本發明所屬技術領域中具有通常知識者可以理解。The term "coupling" as used throughout the scope of the present invention means that the data of the two devices can be transmitted to each other by means of a wired entity, a wireless medium, or a combination thereof, and the technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「國際身分碼」(International Mobile Subscriber Identity,IMSI),係指使用端申請註冊時,由歸屬端指定之數碼,供歸屬端辨識使用端之身分,係本發明所屬技術領域中具有通常知識者可以理解。The International Mobile Subscriber Identity (IMSI) as described in the full text of the present invention refers to the identity specified by the home end when the user applies for registration, and the identity of the user is recognized by the home end, which is the technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「暫時身分碼」(Temporary Mobile Subscriber Identity,TMSI),係指使用端完成身分認證後,由舊訪問端指定之數碼,供舊訪問端辨識使用端之身分,係本發明所屬技術領域中具有通常知識者可以理解。The term "Temporary Mobile Subscriber Identity" (TMSI) as used throughout the present invention refers to the identity specified by the old access terminal after the user completes the identity authentication, and the identity of the used end is recognized by the old access terminal. Those of ordinary skill in the art will understand.

本發明全文所述之「加密金鑰」(ciphering key),係指使用端與歸屬端共有之金鑰,用以進行資料加/解密,係本發明所屬技術領域中具有通常知識者可以理解。The "ciphering key" as used throughout the present invention refers to a key shared by the user end and the home end for data encryption/decryption, which can be understood by those having ordinary knowledge in the technical field to which the present invention pertains.

本發明全文所述之「共享金鑰」(sharing key),係指新訪問端與舊訪問端共有之金鑰,用以進行資料加/解密,係本發明所屬技術領域中具有通常知識者可以理解。The "sharing key" in the text of the present invention refers to a key shared by the new access terminal and the old access terminal for data encryption/decryption, which is common to those skilled in the art to which the present invention pertains. understanding.

本發明全文所述之「認證金鑰」(authenticating key),係指使用端及歸屬端皆可自行產生之金鑰,用以認證使用端之身分,係本發明所屬技術領域中具有通常知識者可以理解。The "authenticating key" as used throughout the present invention refers to a key that can be generated by both the user end and the home end to authenticate the identity of the user, and is a person having ordinary knowledge in the technical field to which the present invention pertains. Can understand.

請參閱第2圖所示,其係本發明GSM漫遊認證方法之系統示意圖,包含一使用端(Mobile Station)1、一新訪問端(New Visitor Location Register,New VLR)2a及一舊訪問端(Old Visitor Location Register,Old VLR)2b,該新訪問端2a耦接該使用端1及該舊訪問端2b,該舊訪問端2b另耦接一歸屬端(Home Location Register,HLR)3,該使用端1、該新訪問端2a、該舊訪問端2b及該歸屬端3之構造係本發明所屬領域具有通常知識者可以理解,在此容不贅述。Please refer to FIG. 2, which is a schematic diagram of a system for GSM roaming authentication according to the present invention, including a mobile station 1, a new visitor register (New VLR) 2a, and an old access terminal ( The Old Visitor Location Register (Old VLR) 2b, the new access terminal 2a is coupled to the user terminal 1 and the old access terminal 2b. The old access terminal 2b is coupled to a Home Location Register (HLR) 3. The configuration of the terminal 1, the new access terminal 2a, the old access terminal 2b, and the home terminal 3 is understood by those of ordinary skill in the art to which the present invention pertains, and is not described herein.

請一併參閱第3及4圖所示,其係本發明GSM漫遊認證方法之流程圖及第一實施例的步驟示意圖,包含一請求程序S1、一詢問程序S2、一回應程序S3、一通知程序S4及一認證程序S5。其中:Please refer to FIG. 3 and FIG. 4 together, which is a flowchart of the GSM roaming authentication method of the present invention and a schematic diagram of the steps of the first embodiment, including a request procedure S1, an inquiry procedure S2, a response procedure S3, and a notification. Program S4 and an authentication program S5. among them:

該請求程序S1,係由該使用端1將一暫時身分碼(TMSI)傳送至一新訪問端2a,用以向該新訪問端2a請求提供漫遊服務,之後,進行該詢問程序S2。詳言之,由於該使用端1位於該舊訪問端2b之通訊範圍內時,該舊訪問端2b已事先指定該暫時身分碼給該使用端1,因此,當該使用端1移動至該新訪問端2a之通訊範圍內時,該使用端1可改向該新訪問端2a請求提供漫遊服務,此時,由於該新訪問端2a不具備用以認證該使用端1之資料,因此,該新訪問端2a無法確認該使用端1之身分是否合法,而須向該舊訪問端2b取得有關該使用端1之資料,用以認證該使用端1之身分,待確認該使用端1為合法身分後,該新訪問端2a才能提供該使用端1所需之漫遊服務內容。The requesting program S1 transmits a temporary identity code (TMSI) to the new access terminal 2a by the user terminal 1 for requesting the new access terminal 2a to provide the roaming service, and then performs the inquiry procedure S2. In detail, since the user terminal 1 is located in the communication range of the old access terminal 2b, the old access terminal 2b has previously designated the temporary identity code to the user terminal 1, and therefore, when the user terminal 1 moves to the new terminal 1, When the access terminal 2a is in the communication range, the user terminal 1 may request to provide the roaming service to the new access terminal 2a. At this time, since the new access terminal 2a does not have the information for authenticating the user terminal 1, the The new access terminal 2a cannot confirm whether the identity of the user terminal 1 is legal, but obtains the information about the user terminal 1 from the old access terminal 2b to authenticate the identity of the user terminal 1, and the user terminal 1 is confirmed to be legal. After the identity, the new access terminal 2a can provide the roaming service content required by the user terminal 1.

該詢問程序S2,係由該新訪問端2a產生一挑戰碼,並將該挑戰碼及該暫時身分碼傳送至該舊訪問端2b,之後,進行該回應程序S3。其中,該詢問程序S2係由該新訪問端2a依序進行一步驟S21及一步驟S22。The inquiry program S2 generates a challenge code from the new access terminal 2a, and transmits the challenge code and the temporary identity code to the old access terminal 2b, and then performs the response procedure S3. The inquiry program S2 sequentially performs a step S21 and a step S22 from the new access terminal 2a.

該步驟S21係由該新訪問端2a接收該暫時身分碼及產生該挑戰碼。詳言之,當該新訪問端2a接收該暫時身分碼後,即得知該使用端1請求該新訪問端2a提供漫遊服務,此時,該新訪問端2a將會儲存該暫時身分碼,並向該舊訪問端2b取得有關認證該使用端1之資料,因此,為確保由該舊訪問端2b所取得資料的有效性,該新訪問端2a將會產生該挑戰碼,並加以儲存,該挑戰碼係為隨機產生、不可重複及單次使用之數值,例如:隨機產生之亂數、隨時間產生之時戳或依序產生之序號等。In step S21, the temporary identity code is received by the new access terminal 2a and the challenge code is generated. In detail, when the new access terminal 2a receives the temporary identity code, it knows that the user 1 requests the new access terminal 2a to provide the roaming service. At this time, the new access terminal 2a stores the temporary identity code. And obtaining information about authenticating the user 1 to the old access terminal 2b. Therefore, in order to ensure the validity of the data obtained by the old access terminal 2b, the new access terminal 2a will generate the challenge code and store it. The challenge code is a randomly generated, non-repeatable, and single-use value, such as a randomly generated random number, a time stamp generated over time, or a sequentially generated serial number.

該步驟S22係由該新訪問端2a傳送該挑戰碼及該暫時身分碼至該舊訪問端2b。詳言之,由於該使用端1及該舊訪問端2b同時存有該暫時身分碼,因此,可憑藉該暫時身分碼,由該舊訪問端2b取得有關認證該使用端1之資料,並憑藉該挑戰碼或該挑戰碼之對應數值是否由該舊訪問端2b正確傳回,來確保該使用端1之資料的有效性。In step S22, the challenge code and the temporary identity code are transmitted by the new access terminal 2a to the old access terminal 2b. In detail, since the user terminal 1 and the old access terminal 2b simultaneously store the temporary identity code, the old access terminal 2b can obtain the information about authenticating the user terminal 1 by virtue of the temporary identity code. Whether the challenge code or the corresponding value of the challenge code is correctly transmitted back by the old access terminal 2b ensures the validity of the data of the user terminal 1.

該回應程序S3,係由該舊訪問端2b確認該暫時身分碼,再以該挑戰碼、一鑑別資料、一國際身分碼(IMSI)及一共享金鑰產生一回應碼,並將該回應碼傳送至該新訪問端2a。之後,進行該通知程序S4。其中,該回應程序S3係由該舊訪問端2b依序進行一步驟S31、一步驟S32及一步驟S33。The response procedure S3 confirms the temporary identity code by the old access terminal 2b, and generates a response code by using the challenge code, an authentication data, an international identity code (IMSI) and a shared key, and the response code is generated. Transfer to the new access terminal 2a. Thereafter, the notification program S4 is performed. The response program S3 performs a step S31, a step S32, and a step S33 in sequence from the old access terminal 2b.

該步驟S31係由該舊訪問端2b接收該暫時身分碼,並確認該暫時身分碼是否無誤。詳言之,由於該舊訪問端2b及該使用端1共同擁有同一暫時身分碼,因此,該舊訪問端2b可以將已儲存之暫時身分碼與接收自該新訪問端2a的暫時身分碼相比對,若比對結果無誤(即兩者相同),則繼續進行該步驟S32,否則,停止進行後續步驟。In step S31, the temporary identity code is received by the old access terminal 2b, and it is confirmed whether the temporary identity code is correct. In detail, since the old access terminal 2b and the user terminal 1 share the same temporary identity code, the old access terminal 2b can store the stored temporary identity code with the temporary identity code received from the new access terminal 2a. If the comparison result is correct (that is, the two are the same), the step S32 is continued, otherwise, the subsequent steps are stopped.

該步驟S32係由該舊訪問端2b以該挑戰碼、該鑑別資料、該國際身分碼及該共享金鑰產生該回應碼,其中,該鑑別資料及該國際身分碼係預先儲存於該舊訪問端,該鑑別資料包含一亂數碼序列、一簽署碼序列及一通訊金鑰序列,該亂數碼序列包含數個亂數碼(例如:r1 ,...,rm 等m個亂數碼),該簽署碼序列包含數個簽署碼(例如:s1 ,...,sm 等m個簽署碼),該通訊金鑰序列包含數個通訊金鑰(例如:k1 ,...,km 等m個亂數碼)。詳言之,藉由該共享金鑰對資料進行加解密,可以確保資料的安全性,當該舊訪問端2b傳輸資料至該新訪問端2a時,可以防止來自其他通訊系統的威脅,例如:干擾、攔截、竊聽或欺騙等。再者,該舊訪問端2b可以選擇將該挑戰碼傳回該新訪問端2a,或由該挑戰碼產生一對應數值,例如:該對應數值為該挑戰碼的二進位補數等,再將該對應數值傳回該新訪問端2a,作為該新訪問端2a識別該舊訪問端2b之機制。在此實施例中,係以該舊訪問端2b將該挑戰碼傳回該新訪問端2a作為實施態樣。接著,該舊訪問端2b將該挑戰碼、該鑑別資料及該國際身分碼藉由該共享金鑰進行加密,而產生該回應碼,其中,該回應碼之產生方式為習知可以藉由金鑰進行資料加密之方式,如下式(1)所示:The step S32 is that the old access terminal 2b generates the response code by using the challenge code, the authentication data, the international identity code and the shared key, wherein the authentication data and the international identity code are pre-stored in the old access. End, the authentication data includes a random number sequence, a signed code sequence, and a communication key sequence, and the random number sequence includes a plurality of chaotic numbers (for example, m chaotic numbers such as r 1 , . . . , r m , etc.) The signed code sequence includes a plurality of signature codes (eg, m sign codes such as s 1 , . . . , s m ), and the communication key sequence includes a plurality of communication keys (eg, k 1 , . . . , k m, etc. m chaotic digital). In detail, the data is encrypted and decrypted by the shared key to ensure the security of the data. When the old access terminal 2b transmits the data to the new access terminal 2a, the threat from other communication systems can be prevented, for example: Interference, interception, eavesdropping or deception. Furthermore, the old access terminal 2b may choose to transmit the challenge code back to the new access terminal 2a, or generate a corresponding value from the challenge code, for example, the corresponding value is the binary complement of the challenge code, etc., and then The corresponding value is transmitted back to the new access terminal 2a as a mechanism for the new access terminal 2a to recognize the old access terminal 2b. In this embodiment, the challenge code is transmitted back to the new access terminal 2a by the old access terminal 2b as an implementation aspect. Then, the old access terminal 2b encrypts the challenge code, the authentication data, and the international identity code by using the shared key, and generates the response code, wherein the response code is generated by a conventional method. The method of encrypting the data by the key is as shown in the following formula (1):

其中,C為該回應碼:E為加密函數,例如:DES或3DES等對稱式加密演算法:K2a2b 為該新訪問端2a及該舊訪問端2b共有的共享金鑰;N為該挑戰碼或由該挑戰碼所產生之對應數值;B為該鑑別資料;IMSI為該國際身分碼。Wherein, C is the response code: E is an encryption function, for example, a symmetric encryption algorithm such as DES or 3DES: K 2a2b is a shared key shared by the new access terminal 2a and the old access terminal 2b; N is the challenge code Or the corresponding value generated by the challenge code; B is the authentication data; the IMSI is the international identity code.

該步驟S33係由該舊訪問端2b將該回應碼傳送至該新訪問端2a。詳言之,該回應碼係由該舊訪問端2b經由開放式通道傳送至該新訪問端2a。The step S33 is to transmit the response code to the new access terminal 2a by the old access terminal 2b. In detail, the response code is transmitted by the old access terminal 2b to the new access terminal 2a via the open channel.

該通知程序S4,係由該新訪問端2a以該共享金鑰確認該回應碼,並將該亂數碼序列之一亂數碼傳送至該使用端1。之後,進行該認證程序S5。其中,該通知程序S4係由該新訪問端2a依序進行一步驟S41及一步驟S42。The notification program S4 confirms the response code by the new access terminal 2a with the shared key, and transmits one of the random number sequences to the user terminal 1. Thereafter, the authentication procedure S5 is performed. The notification program S4 sequentially performs a step S41 and a step S42 by the new access terminal 2a.

該步驟S41係由該新訪問端2a接收該回應碼,並以該共享金鑰確認該回應碼。詳言之,由於該新訪問端2a與該舊訪問端2b共同擁有該共享金鑰,因此,該新訪問端2a可由該共享金鑰對該回應碼進行解密,其解密方式為該舊訪問端2b加密方式之對應解密方式,在此容不贅述,該新訪問端2a可由該回應碼解密後的資料(例如:該挑戰碼、該鑑別資料及該國際身分碼),確認該回應碼是否包含該新訪問端2a所傳送之挑戰碼或該挑戰碼之對應數值,即確認該回應碼中的挑戰碼與該新訪問端2a所傳送之挑戰碼是否相對應,若確認結果為「是」,該新訪問端2a儲存該鑑別資料及該國際身分碼,否則,停止進行後續步驟,藉此確認該回應碼是否由合法的舊訪問端2b傳回。In step S41, the response code is received by the new access terminal 2a, and the response code is confirmed by the shared key. In detail, since the new access terminal 2a shares the shared key with the old access terminal 2b, the new access terminal 2a can decrypt the response code by the shared key, and the decryption method is the old access terminal. The corresponding decryption mode of the 2b encryption mode is not described here. The new access terminal 2a can confirm the response code by including the data decrypted by the response code (for example, the challenge code, the authentication data, and the international identity code). The challenge code transmitted by the new access terminal 2a or the corresponding value of the challenge code, that is, whether the challenge code in the response code corresponds to the challenge code transmitted by the new access terminal 2a, and if the confirmation result is "Yes", The new access terminal 2a stores the authentication data and the international identity code. Otherwise, the subsequent steps are stopped, thereby confirming whether the response code is returned by the legitimate old access terminal 2b.

該步驟S42係由該新訪問端2a將該鑑別資料之亂數碼序列的一亂數碼傳送至該使用端1。詳言之,該新訪問端2a係由該亂數碼序列之中選擇一個未使用過的亂數碼,例如:首次認證時選擇該亂數碼序列的第一個亂數碼(r1 ),後續進行認證時,依序選擇第二、三、...亂數碼(r2,3,... ),待將所選擇之亂數碼紀錄後,傳送至該使用端1,用以由該使用端1是否正確傳回該亂數碼對應之簽署碼,作為認證該使用端1之依據。In step S42, the new access terminal 2a transmits a random number of the random number sequence of the authentication data to the user terminal 1. In detail, the new access terminal 2a selects an unused random number from the random number sequence, for example, selects the first random number (r 1 ) of the random number sequence during the first authentication, and subsequently performs authentication. When the second, third, ... chaotic digital (r 2, 3, ... ) is selected in sequence, after the selected random digital record is transmitted to the use end 1, for use by the use end 1 Whether the signature code corresponding to the chaotic digital is correctly returned is used as the basis for authenticating the user terminal 1.

該認證程序S5,係由該使用端1以該加密金鑰及該亂數碼產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端2a,由該新訪問端2a確認該認證簽署碼,以作為提供漫遊服務之依據。其中,該認證程序S5係由該使用端1進行一步驟S51及一步驟S52,再由該新訪問端2a進行一步驟S53。The authentication program S5 generates an authentication signature code by the user terminal 1 with the encryption key and the chaotic digital number, and transmits the authentication signature code to the new access terminal 2a, and the new access terminal 2a confirms the authentication signature. Code as the basis for providing roaming services. The authentication program S5 performs a step S51 and a step S52 from the user terminal 1, and then performs a step S53 by the new access terminal 2a.

該步驟S51係由該使用端1接收該新訪問端2a所傳送之亂數碼,並以該亂數碼及該加密金鑰依據一雜湊函數(例如:A3單向雜湊函數)進行運算,而產生該認證簽署碼。詳言之,由於該使用端1與該歸屬端3共同擁有該加密金鑰,且該使用端1具有產生該簽署碼之能力,例如:利用A3單向雜湊函數等方式運算,因此,該使用端1可以由該亂數碼及該加密金鑰進行運算,而產生該認證簽署碼。In step S51, the user 1 receives the random number transmitted by the new access terminal 2a, and performs the operation according to the hash function and the encryption key according to a hash function (for example, an A3 one-way hash function). Certification signing code. In detail, since the user 1 and the home terminal 3 share the encryption key, and the user 1 has the ability to generate the signature code, for example, using an A3 one-way hash function, the use is performed. The terminal 1 can be operated by the chaotic digital and the encryption key to generate the authentication signature code.

該步驟S52係由該使用端1將該認證簽署碼傳送至該新訪問端2a。詳言之,由於該認證簽署碼係由該使用端1以相同於該歸屬端3之簽署碼的運算方式所產生,因此,該認證簽署碼可供該新訪問端2a作為認證該使用端1的資料。In step S52, the authentication end code is transmitted by the user terminal 1 to the new access terminal 2a. In detail, since the authentication signature code is generated by the user terminal 1 in the same manner as the signature code of the home terminal 3, the authentication signature code can be used by the new access terminal 2a as the authentication terminal 1 data of.

該步驟S53係由該新訪問端2a確認該認證簽署碼。詳言之,由於該新訪問端2a已預先儲存該鑑別資料,且該新訪問端2a已將傳送至該使用端1的亂數碼加以紀錄,因此,可由該鑑別資料中找出與所傳送的亂數碼(例如:r1 )具有相同順序的簽署碼(例如:s1 ),作為確認該認證簽署碼之依據,若該認證簽署碼與所傳送的亂數碼對應之簽署碼相符,則該新訪問端2a認證該使用端1之身分為合法身分,並提供該使用端1所需之漫遊服務內容。This step S53 confirms the authentication signature code by the new access terminal 2a. In detail, since the new access terminal 2a has previously stored the authentication data, and the new access terminal 2a has recorded the random number transmitted to the user terminal 1, the information can be found and transmitted from the authentication data. A chaotic number (for example: r 1 ) has a signature code (eg, s 1 ) in the same order as a basis for confirming the authentication signature code, and if the authentication signature code matches the signature code corresponding to the transmitted chaotic digit, the new The access terminal 2a authenticates that the user 1 is classified into a legal identity and provides the content of the roaming service required by the user.

綜上所述,本發明GSM漫遊認證方法之第一實施例可以提供一種單向認證方法,藉由該新訪問端2a及該舊訪問端2b共同擁有該共享金鑰,作為雙方資料鑑別之依據,因此,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。In summary, the first embodiment of the GSM roaming authentication method of the present invention can provide a one-way authentication method, by which the new access terminal 2a and the old access terminal 2b jointly share the shared key, as the basis for data authentication of both parties. Therefore, data can be transmitted in open channels, heterogeneous communication systems, and long-distance communication, and data security can be ensured to prevent data from being interfered, intercepted, eavesdropped, or deceived.

請參閱第3及5圖所示,其係本發明GSM漫遊認證方法之流程圖及第二實施例的步驟示意圖,本發明之第二實施例係提供一種雙向認證方法,包含一請求程序S1’、一詢問程序S2’、一回應程序S3’、一通知程序S4’及一認證程序S5’。其中:Please refer to FIG. 3 and FIG. 5 , which are flowcharts of the GSM roaming authentication method of the present invention and the steps of the second embodiment. The second embodiment of the present invention provides a two-way authentication method, including a request procedure S1 ′. An inquiry program S2', a response program S3', a notification program S4', and an authentication program S5'. among them:

該請求程序S1’,係包含一步驟S11’及一步驟S12’,由該使用端1產生一第一挑戰碼,再將該第一挑戰碼及一暫時身分碼傳送至該新訪問端2a,用以向該新訪問端2a請求提供漫遊服務,其中,該第一挑戰碼的功用為驗證該新訪問端2a的身分;該第一挑戰碼與該第一實施例之挑戰碼的產生方式大致相同,在此容不贅述。The requesting program S1' includes a step S11' and a step S12'. The first challenge code is generated by the user terminal 1, and the first challenge code and a temporary identity code are transmitted to the new access terminal 2a. The request for providing the roaming service to the new access terminal 2a, wherein the function of the first challenge code is to verify the identity of the new access terminal 2a; the first challenge code is generated in a manner similar to the challenge code of the first embodiment. The same, I will not repeat them here.

該詢問程序S2’,係包含一步驟S21’及一步驟S22’。由該新訪問端2a接收並儲存該第一挑戰碼及該國際身分碼,且產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該暫時身分碼傳送至一舊訪問端2b,其中,該第二挑戰碼與該第一實施例之挑戰碼的功用及產生方式大致相同,在此容不贅述。The inquiry program S2' includes a step S21' and a step S22'. Receiving and storing the first challenge code and the international identity code by the new access terminal 2a, and generating a second challenge code, and transmitting the first challenge code, the second challenge code, and the temporary identity code to an old The access terminal 2b, wherein the second challenge code is substantially the same as the function and the generation manner of the challenge code of the first embodiment, is not described herein.

該回應程序S3’包含一步驟S31’、一步驟S32’及一步驟S33’,由該舊訪問端2b確認該暫時身分碼,再以該第二挑戰碼、一鑑別資料、一國際身分碼、一認證金鑰及一共享金鑰產生一回應碼,再將該回應碼傳送至該新訪問端2a。其中,該認證金鑰係先前由該歸屬端3產生且傳送至舊訪問端2b,待該使用端1之身分通過該舊訪問端2b之認證後,該認證金鑰則儲存於該舊訪問端2b。此外,該暫時身分碼之確認方式、該鑑別資料之組成方式、該回應碼之傳送方式與該第一實施例大致相同,在此容不贅述。其中,該回應碼之產生方式係如下式(2)所示:The response program S3' includes a step S31', a step S32' and a step S33'. The old access terminal 2b confirms the temporary identity code, and then uses the second challenge code, an authentication data, an international identity code, A certificate key and a shared key generate a response code, and the response code is transmitted to the new access terminal 2a. The authentication key is previously generated by the home terminal 3 and transmitted to the old access terminal 2b. After the identity of the user terminal 1 is authenticated by the old access terminal 2b, the authentication key is stored in the old access terminal. 2b. In addition, the manner of confirming the temporary identity code, the manner of composition of the authentication data, and the transmission mode of the response code are substantially the same as those of the first embodiment, and are not described herein. The response code is generated as shown in the following formula (2):

其中,C為該回應碼;E為加密函數,例如:DES或3DES等對稱式加密演算法;K2a2b 為該新訪問端2a及該舊訪問端2b共有的共享金鑰;N2 為該第二挑戰碼或由該第二挑戰碼所產生之對應數值;B為該鑑別資料;IMSI為該國際身分碼;Kauth 為預先儲存於該舊訪問端2b之認證金鑰。Where C is the response code; E is an encryption function, such as a symmetric encryption algorithm such as DES or 3DES; K 2a2b is a shared key shared by the new access terminal 2a and the old access terminal 2b; N 2 is the first The second challenge code or the corresponding value generated by the second challenge code; B is the authentication data; the IMSI is the international identity code; and K auth is the authentication key pre-stored on the old access terminal 2b.

該通知程序S4’,包含一步驟S41’、一步驟S42’及一步驟S43’,由該新訪問端2a接收該回應碼,並以該共享金鑰解密該回應碼所包含之資料(例如:該第二挑戰碼或由該第二挑戰碼所產生之對應數值、該鑑別資料、該國際身分碼、該認證金鑰),以確認該回應碼所包含之資料與該新訪問端2a所傳送之第二挑戰碼是否相對應,例如:確認該回應碼中的第二挑戰碼與該新訪問端2a所傳送之第二挑戰碼是否相同,若確認無誤,則該新訪問端2a儲存該鑑別資料、該國際身分碼及該認證金鑰,接著,以該第一挑戰碼及該認證金鑰產生一認證碼,其中,該認證碼之產生方式為習知可以藉由金鑰進行資料加密之方式,如下式(3)所示:The notification program S4' includes a step S41', a step S42' and a step S43'. The new access terminal 2a receives the response code and decrypts the data contained in the response code with the shared key (for example: Determining, by the second challenge code or the corresponding value generated by the second challenge code, the authentication data, the international identity code, the authentication key, to confirm that the data included in the response code is transmitted by the new access terminal 2a Whether the second challenge code corresponds to, for example, confirming whether the second challenge code in the response code is the same as the second challenge code transmitted by the new access terminal 2a, and if the confirmation is correct, the new access terminal 2a stores the identification. Data, the international identity code and the authentication key, and then generating an authentication code by using the first challenge code and the authentication key, wherein the authentication code is generated by means of data encryption by a key The mode is as shown in the following formula (3):

其中,D為該認證碼;E為加密函數,例如:DES或3DES等對稱式加密演算法:Kauth 為該回應碼所包含之認證金鑰:N1 為該第一挑戰碼。之後,再由該新訪問端2a將該認證碼及該亂數碼序列之一亂數碼(例如:r1 )傳送至該使用端I。Where D is the authentication code; E is an encryption function, such as a symmetric encryption algorithm such as DES or 3DES: K auth is the authentication key included in the response code: N 1 is the first challenge code. Then, the new access terminal 2a transmits the authentication code and one of the random number sequences to the use terminal 1 by a random number (for example, r 1 ).

該認證程序S5’,包含一步驟S51’、一步驟S52’、一步驟S53’、一步驟S54’及一步驟S55’,由該使用端1將該第一挑戰碼及該加密金鑰依據一雜湊函數(例如:A8單向雜湊函數等)產生該認證金鑰,並以該認證金鑰產生該認證碼,以確認該新訪問端2a所傳送的認證碼是否正確,並確認該第一挑戰碼與該使用端1所傳送之該第一挑戰碼相同,以此作為該使用端1認證該新訪問端2a之機制,接著,再由該使用端1以該加密金鑰及該亂數碼(例如:r1 )產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端2a,由該新訪問端2a確認該認證簽署碼,以作為提供漫遊服務之依據,其中,該認證簽署碼之產生及確認方式與該第一實施例大致相同,在此容不贅述。The authentication program S5' includes a step S51', a step S52', a step S53', a step S54' and a step S55'. The first challenge code and the encryption key are used by the user terminal 1 according to the A hash function (for example, an A8 one-way hash function, etc.) generates the authentication key, and generates the authentication code with the authentication key to confirm whether the authentication code transmitted by the new access terminal 2a is correct, and confirms the first challenge. The code is the same as the first challenge code transmitted by the user terminal 1, as the mechanism for the user terminal 1 to authenticate the new access terminal 2a, and then the user terminal 1 uses the encryption key and the chaotic digital ( For example: r 1 ) generates an authentication signing code, and transmits the authentication signing code to the new accessing end 2a, and the new accessing end 2a confirms the authentication signing code as a basis for providing roaming service, wherein the authentication signing The generation and confirmation of the code are substantially the same as those of the first embodiment, and are not described herein.

綜上所述,本發明GSM漫遊認證方法之第二實施例可以提供一種雙向認證方法,藉由該新訪問端2a及該舊訪問端2b共同擁有該共享金鑰,作為雙方資料鑑別之依據,因此,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。In summary, the second embodiment of the GSM roaming authentication method of the present invention can provide a two-way authentication method, wherein the new access terminal 2a and the old access terminal 2b jointly share the shared key, as the basis for data authentication between the two parties. Therefore, data can be transmitted in open channels, heterogeneous communication systems, and long-distance communication, and data security can be ensured to prevent data from being interfered, intercepted, eavesdropped, or deceived.

藉由前揭之技術手段,本發明所揭示之GSM漫遊認證方法方法的主要特點列舉如下:藉由該使用端1及該歸屬端3共同擁有該加密金鑰,該新訪問端2a及該舊訪問端2b共同擁有該共享金鑰,該使用端1及該舊訪問端2b共同擁有該認證金鑰,作為資料鑑別之依據,其中,該認證金鑰係由該歸屬端3產生且傳送至舊訪問端2b,待該使用端1之身分認證通過後,該認證金鑰則儲存於該舊訪問端2b。因此,可以在開放式通道、異質性通訊系統及長距離通訊等情形下傳輸資料,並可確保資料的安全性,避免資料受到干擾、攔截、竊聽或欺騙。The main features of the GSM roaming authentication method disclosed by the present invention are as follows: The user 1 and the home terminal 3 jointly own the encryption key, the new access terminal 2a and the old The access terminal 2b shares the shared key, and the user 1 and the old access terminal 2b jointly own the authentication key as a basis for data authentication, wherein the authentication key is generated by the home terminal 3 and transmitted to the old The access terminal 2b, after the identity authentication of the user terminal 1 is passed, the authentication key is stored in the old access terminal 2b. Therefore, data can be transmitted in open channels, heterogeneous communication systems, and long-distance communication, and data security can be ensured to prevent data from being interfered, intercepted, eavesdropped, or deceived.

雖然本發明已利用上述較佳實施例揭示,然其並非用以限定本發明,任何熟習此技藝者在不脫離本發明之精神和範圍之內,相對上述實施例進行各種更動與修改仍屬本發明所保護之技術範疇,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。While the invention has been described in connection with the preferred embodiments described above, it is not intended to limit the scope of the invention. The technical scope of the invention is protected, and therefore the scope of the invention is defined by the scope of the appended claims.

[本發明][this invention]

1...使用端1. . . Use side

2a...新訪問端2a. . . New access

2b...舊訪問端2b. . . Old access

3...歸屬端3. . . Home

S1,S1’...請求程序S1, S1’. . . Request procedure

S2,S2’...詢問程序S2, S2’. . . Inquiry procedure

S3,S3’...回應程序S3, S3’. . . Response procedure

S4,S4’...通知程序S4, S4’. . . Notifier

S5,S5’...認證程序S5, S5’. . . Certification procedure

[習知][知知]

9...習知GSM通訊系統9. . . Conventional GSM communication system

91...使用端91. . . Use side

92a...新訪問端92a. . . New access

92b...舊訪問端92b. . . Old access

93...歸屬端93. . . Home

SC...安全通道SC. . . Exit

第1圖:習知GSM架構之系統示意圖。Figure 1: Schematic diagram of the system of the conventional GSM architecture.

第2圖:本發明GSM漫遊認證方法之系統示意圖。Figure 2 is a schematic diagram of the system of the GSM roaming authentication method of the present invention.

第3圖:本發明GSM漫遊認證方法之流程圖。Figure 3 is a flow chart of the GSM roaming authentication method of the present invention.

第4圖:本發明GSM漫遊認證方法之第一實施例的步驟示意圖。Figure 4 is a diagram showing the steps of the first embodiment of the GSM roaming authentication method of the present invention.

第5圖:本發明GSM漫遊認證方法之第二實施例的步驟示意圖。Figure 5 is a schematic diagram showing the steps of a second embodiment of the GSM roaming authentication method of the present invention.

1...使用端1. . . Use side

2a...新訪問端2a. . . New access

2b...舊訪問端2b. . . Old access

3...歸屬端3. . . Home

S1,S1’...請求程序S1, S1’. . . Request procedure

S2,S2’...詢問程序S2, S2’. . . Inquiry procedure

S3,S3’...回應程序S3, S3’. . . Response procedure

S4,S4’...通知程序S4, S4’. . . Notifier

S5,S5’...認證程序S5, S5’. . . Certification procedure

Claims (11)

一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端將一暫時身分碼傳送至一新訪問端,用以向該新訪問端請求提供漫遊服務;一詢問程序,係由該新訪問端產生一挑戰碼,並將該挑戰碼及該暫時身分碼傳送至一舊訪問端,該挑戰碼為隨時間產生之時戳;一回應程序,係由該舊訪問端確認該暫時身分碼,再以該挑戰碼、一鑑別資料、一國際身分碼及一共享金鑰產生一回應碼,並將該回應碼傳送至該新訪問端;一通知程序,係由該新訪問端以該共享金鑰確認該回應碼,並將一亂數碼序列之一亂數碼傳送至該使用端;及一認證程序,係由該使用端以一加密金鑰及該亂數碼產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端,由該新訪問端確認該認證簽署碼,以作為提供漫遊服務之依據。 A GSM roaming authentication method includes: a requesting procedure, wherein a temporary identity code is transmitted by a user to a new access terminal for requesting a roaming service to the new accessing end; an inquiry procedure is performed by the new The access terminal generates a challenge code, and transmits the challenge code and the temporary identity code to an old access terminal, the challenge code is a time stamp generated over time; and a response procedure is performed by the old access terminal to confirm the temporary identity code And generating a response code by using the challenge code, an authentication data, an international identity code and a shared key, and transmitting the response code to the new access terminal; a notification procedure is performed by the new access terminal The key confirms the response code, and transmits a random number sequence to the user terminal; and an authentication program, wherein the user generates an authentication code by using an encryption key and the random number, and The authentication signature code is transmitted to the new access terminal, and the new access terminal confirms the authentication signature code as a basis for providing roaming services. 如申請專利範圍第1項所述之GSM漫遊認證方法,其中該通知程序係由該新訪問端確認該回應碼中的挑戰碼與該新訪問端所傳送之挑戰碼是否相對應。 The GSM roaming authentication method according to claim 1, wherein the notification procedure is to confirm, by the new access terminal, whether the challenge code in the response code corresponds to a challenge code transmitted by the new access terminal. 如申請專利範圍第1項所述之GSM漫遊認證方法,其中該通知程序係由該新訪問端確認該挑戰碼無誤後,儲存該鑑別資料及該國際身分碼。 The GSM roaming authentication method according to claim 1, wherein the notification program stores the authentication data and the international identity code after the new access terminal confirms that the challenge code is correct. 一種GSM漫遊認證方法,係包含:一請求程序,係由一使用端產生一第一挑戰碼,再將該 第一挑戰碼及一暫時身分碼傳送至一新訪問端,用以向該新訪問端請求提供漫遊服務,該第一挑戰碼為隨時間產生之時戳;一詢問程序,係由該新訪問端產生一第二挑戰碼,再將該第一挑戰碼、該第二挑戰碼及該暫時身分碼傳送至一舊訪問端,該第二挑戰碼為隨時間產生之時戳;一回應程序,係由該舊訪問端確認該暫時身分碼,再以該第二挑戰碼、一鑑別資料、一國際身分碼、一認證金鑰及一共享金鑰產生一回應碼,再將該回應碼傳送至該新訪問端;一通知程序,係由該新訪問端以該共享金鑰確認該回應碼,再以該第一挑戰碼及該認證金鑰產生一認證碼,再將該認證碼及一亂數碼序列之一亂數碼傳送至該使用端;及一認證程序,係由該使用端產生該認證金鑰,並以該認證金鑰確認該認證碼,再以一加密金鑰及該亂數碼產生一認證簽署碼,並將該認證簽署碼傳送至該新訪問端,由該新訪問端確認該認證簽署碼,以作為提供漫遊服務之依據。 A GSM roaming authentication method includes: a requesting program, which generates a first challenge code by a user, and then The first challenge code and a temporary identity code are transmitted to a new access terminal for requesting the new access terminal to provide a roaming service, the first challenge code is a time stamp generated over time; an inquiry procedure is performed by the new access The terminal generates a second challenge code, and then transmits the first challenge code, the second challenge code, and the temporary identity code to an old access terminal, where the second challenge code is a time stamp generated over time; a response procedure, Confirming the temporary identity code by the old access terminal, and generating a response code by using the second challenge code, an authentication data, an international identity code, an authentication key, and a shared key, and transmitting the response code to the a new access terminal; a notification procedure, wherein the new access terminal confirms the response code by using the shared key, and then generates an authentication code by using the first challenge code and the authentication key, and then the authentication code and the mess One of the digital sequences is transmitted to the user terminal; and an authentication program is generated by the user terminal, and the authentication key is confirmed by the authentication key, and then generated by an encryption key and the chaotic digital a certification signing code, and will recognize The signing of the new access code to the end, confirmed by the end of the certification signed new access code as a basis of providing roaming services. 如申請專利範圍第4項所述之GSM漫遊認證方法,其中該通知程序係由該新訪問端確認該回應碼中的第二挑戰碼與該新訪問端所傳送之第二挑戰碼是否相對應。 The GSM roaming authentication method according to claim 4, wherein the notification procedure is that the new access terminal confirms whether the second challenge code in the response code corresponds to the second challenge code transmitted by the new access terminal. . 如申請專利範圍第4項所述之GSM漫遊認證方法,其中該使用端係以該第一挑戰碼及該加密金鑰產生該認證金鑰。 The GSM roaming authentication method according to claim 4, wherein the user end generates the authentication key by using the first challenge code and the encryption key. 如申請專利範圍第4項所述之GSM漫遊認證方法,其中該使用端係將該第一挑戰碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證金鑰。 The GSM roaming authentication method according to claim 4, wherein the user end operates the first challenge code and the encryption key according to a hash function to generate the authentication key. 如申請專利範圍第4項所述之GSM漫遊認證方法,其中該新訪問端確認該第二挑戰碼無誤後,儲存該鑑別資料、該國際身分碼及該認證金鑰。 The GSM roaming authentication method according to claim 4, wherein the new access terminal confirms that the second challenge code is correct, and stores the authentication data, the international identity code, and the authentication key. 如申請專利範圍第1或4項所述之GSM漫遊認證方法,其中該舊訪問端儲存該鑑別資料、該國際身分碼及該認證金鑰。 The GSM roaming authentication method according to claim 1 or 4, wherein the old access terminal stores the authentication data, the international identity code, and the authentication key. 如申請專利範圍第1或4項所述之GSM漫遊認證方法,其中該使用端係將該亂數碼及該加密金鑰依據一雜湊函數進行運算,而產生該認證簽署碼。 The GSM roaming authentication method according to claim 1 or 4, wherein the user terminal operates the chaotic digital and the encryption key according to a hash function to generate the authentication signature code. 如申請專利範圍第1或4項所述之GSM漫遊認證方法,其中該通知步驟係由該亂數碼序列之中選取一個未使用過的亂數碼。The GSM roaming authentication method according to claim 1 or 4, wherein the notifying step selects an unused random number from the random number sequence.
TW101100670A 2012-01-06 2012-01-06 A gsm roaming authentication method TWI451783B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW101100670A TWI451783B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method
US13/734,235 US8855604B2 (en) 2012-01-06 2013-01-04 Roaming authentication method for a GSM system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101100670A TWI451783B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method

Publications (2)

Publication Number Publication Date
TW201330663A TW201330663A (en) 2013-07-16
TWI451783B true TWI451783B (en) 2014-09-01

Family

ID=49225925

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101100670A TWI451783B (en) 2012-01-06 2012-01-06 A gsm roaming authentication method

Country Status (1)

Country Link
TW (1) TWI451783B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200910897A (en) * 2007-08-24 2009-03-01 Ind Tech Res Inst Group authentication method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200910897A (en) * 2007-08-24 2009-03-01 Ind Tech Res Inst Group authentication method

Also Published As

Publication number Publication date
TW201330663A (en) 2013-07-16

Similar Documents

Publication Publication Date Title
US10638321B2 (en) Wireless network connection method and apparatus, and storage medium
JP4546240B2 (en) User authentication method and system using challenge / response method
CN101969638B (en) Method for protecting international mobile subscriber identity (IMSI) in mobile communication
KR101038096B1 (en) Key Authentication Method in Binary CDMA
CN112566119B (en) Terminal authentication method, device, computer equipment and storage medium
US20110078443A1 (en) Method and system for secure communications on a managed network
US20090313472A1 (en) Secure session key generation
US20100211790A1 (en) Authentication
CN106506161B (en) Privacy protection method and privacy protection device in vehicle communication
KR100957044B1 (en) Mutual authentication method using Kerberos and its system
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN1964258A (en) Method for secure device discovery and introduction
JP2012019511A (en) System and method of safety transaction between wireless communication apparatus and server
CN101895881B (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN101116284A (en) Anti-clone mutual authentication in a radio communication network
US20120142315A1 (en) Method for authentication and key establishment in a mobile communication system and method of operating a mobile station and a visitor location register
US8855604B2 (en) Roaming authentication method for a GSM system
Juang et al. Efficient 3GPP authentication and key agreement with robust user privacy protection
CN101784048A (en) Method and system for dynamically updating identity authentication and secret key agreement of secret key
CN101192927B (en) Authorization and Multi-Authentication Method Based on Identity Confidentiality
TWI455622B (en) A gsm roaming authentication method
TWI451783B (en) A gsm roaming authentication method
TWI434588B (en) A gsm roaming authentication method
CN104333448B (en) Network authentication system and method thereof
Vizvari et al. Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees