UMTS authenticating vector generating method based on service network label

A service network and authentication vector technology, which is applied in the field of UMTS authentication vector generation based on the service network logo, can solve problems such as unguaranteed, relocation attacks, user information leakage, etc., and achieve the effect of improving security strength and preventing relocation attacks

Inactive Publication Date: 2007-08-29
上海宇梦通信科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, through the current authentication scheme, the UE can authenticate the legitimacy of the HN and SN, but it cannot guarantee that the SN is the network that the UE wants to access
I

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UMTS authenticating vector generating method based on service network label

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The security assumption of the present invention is: the home network and the service network are legal and safe, and the UTRAN is not safe, which conforms to the actual situation of mobile communication.

[0017] As shown in Fig. 1, the present invention based on the UMTS authentication vector generation method of the service network mark, by modifying the MAC in AUTH, one of the five tuples of the UMTS authentication vector, makes the MAC include the information of the service network.

[0018] Described MAC still adopts f1 algorithm described in 3GPP standard TS33.102 to calculate, and it comprises four input parameters: AMF, SQN, RAND and MK, respectively correspond to the AMF of original MAC generation algorithm (3GPP TS33.102), SQN , RAND and K.

[0019] The intermediate quantity MK is calculated according to the following formula:

[0020] MK=KNID (1)

[0021] Among them, K is the key shared by HN and UE, NID is the service network identifier, and the length i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

First, the method calculates intermediate quantity MK,MK=KNID according to formula, where K is cipher key shared by home network and user, NID is as ID of service network with length equal to 128bit. When service network is circuit-switching domain, lower 40 bit of NID are location area indication LAI, and higher 88 bit are zero. When service network is packet switching domain, lower 48 bit of NID are route area indication RAI, and higher 80 bit are zero. Then, using f1 algorithm calculates MAC in AUTH being as one of quintuple of UMTS authentication vectors. The invention can raise security intensity of UMTS network access authentication, being suitable to third generation of mobile communication system.

Description

technical field [0001] The invention relates to a method for generating an authentication vector required for access authentication in a universal mobile communication system (UMTS). Background technique [0002] UMTS is an optional standard of the third generation mobile communication system, which adopts a two-way authentication mode. When a user (UE) accesses the UMTS, the legality and reliability of the network can be authenticated, thereby enhancing the security of the wireless network. [0003] In the current 3GPP security standard (3GPP TS33.102), the service network (SN) proves the legitimacy of the network to the UE by providing a legal authentication vector quintuple (RAND, XRES, CK, IK, AUTH). The authentication vector is based on the key K shared by the UE and the home network (HN), and does not contain any SN information. Therefore, through the current authentication scheme, the UE can authenticate the legitimacy of the HN and the SN, but it cannot guarantee t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04W12/122
Inventor 严宏
Owner 上海宇梦通信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products