Method for implementing user and equipment authentication separately employing diameter protocol

A technology for protocol implementation and device authentication, applied in the field of communication systems, it can solve problems such as two rounds of authentication that do not support separate authentication of users and devices, and achieve the effect of strong practicability and simple implementation.

Inactive Publication Date: 2012-07-04
SAMSUNG ELECTRONICS CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the current diameter authentication protocol does not support two rounds of authentication (double authentication) in which users and devices are authenticated separately.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing user and equipment authentication separately employing diameter protocol
  • Method for implementing user and equipment authentication separately employing diameter protocol
  • Method for implementing user and equipment authentication separately employing diameter protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Using double EAP authentication, an MS uses the embodiment of the initial access process of the method proposed by the present invention, refer to figure 2 , its main steps include:

[0037] 1) MS and Authenticator exchange authentication policies through BS;

[0038] 2) The Authenticator selects the authentication method, and sends an authentication request AuthRelay_EAP_TRANSFER message to the MS through the BS, including information such as EAP-Request / Identity;

[0039] 3) After receiving the EAP_TRANSFER (EAP-Request / Identity) message, the MS replies to the Authenticator through the BS with EAP_TRANSFER (EAP-response / Identity), and reports the identity required for authentication;

[0040] 4) When the Authenticator receives the MS EAP-Identiy, it sets the state of the Diameter authentication state machine to IDLE, and the initial value of the first-round authentication success flag is False; and constructs a DER message according to the received MS EAP-payload. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing the respective authentication of a user and equipment by adopting a Diameter protocol. An authenticator sets the initial state of a Diameter client authentication state machine as IDLE; the authenticator constructs a corresponding DER message according to an attribute value related to the MS authentication, and sends the DER message to an AAA authentication server; the authenticator analyzes a DEA message when receiving the DEA message from the AAA authentication server, and the first round of authentication is successfully finished if the analyzed DEA message contains the attribute value which is successfully authenticated; a mark for the first round of successful authentication is set as TRUE; the authenticator constructs a corresponding DER message according to an attribute value related to the MS authentication, and sends the DER message to the AAA authentication server; the authenticator analyzes a DEA message when receiving the DEA message from the AAA authentication server; and if the analyzed DEA message contains the attribute value which is successfully authenticated, the authenticator is changed into an open state, and the authentication is finished. The method can support both single authentication and double authentication; and the method can support the double authentication through slight modification based on the prior diameter authentication state machine, and has backward compatibility.

Description

technical field [0001] The invention relates to a communication system, in particular to a method for implementing user and equipment separate authentication (Double EAP) by adopting a diameter protocol in a mobile Wimax system. Background technique [0002] Four authentication methods are defined in the latest version 1.0.0 of Wimax's network structure specification: user authentication: User single EAP; device authentication: Device Single EAP; simultaneous user and device authentication: User / Device Single EAP; user and device respectively Authentication: Double EAP (two EAP procedures are performed). [0003] The method of user and device authentication (that is, double EAP) requires two rounds of authentication: the first round of device authentication, and the second round of user authentication. If the authentication of the user (User) and the mobile station (MS) needs to be performed separately, the way of double EAP can be selected. A typical application scenario ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/28
Inventor 王春花时忆杰
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products