[go: up one dir, main page]

CN101505222B - Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium - Google Patents

Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium Download PDF

Info

Publication number
CN101505222B
CN101505222B CN2009100075558A CN200910007555A CN101505222B CN 101505222 B CN101505222 B CN 101505222B CN 2009100075558 A CN2009100075558 A CN 2009100075558A CN 200910007555 A CN200910007555 A CN 200910007555A CN 101505222 B CN101505222 B CN 101505222B
Authority
CN
China
Prior art keywords
authentication
terminal
base station
server
wireless base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100075558A
Other languages
Chinese (zh)
Other versions
CN101505222A (en
Inventor
高杉耕一
神谷弘树
斋藤洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Publication of CN101505222A publication Critical patent/CN101505222A/en
Application granted granted Critical
Publication of CN101505222B publication Critical patent/CN101505222B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • Y02B60/50

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A terminal identification method is provided which enables two-way communications between terminals and a network while identifying terminal IDs and protecting privacy. Also, authentication method and system are provided which require no complicated calculating process, less steps and smaller amount for wireless communications, and less power consumption. A server and terminal share a hash function and an initial value determined for each terminal, calculate the same temporary ID by hashing the initial value the same number of times with the hash function, and identify the terminal using the calculated temporary ID. The server and the terminal also hold a common hash function and authentication information, acquire an authenticating communication parameter from communication parameters temporarily common during communication, and generate an authentication key using the authentication information, the authenticating communication parameter, and the hash function. Then at least one of the server and terminal performs authentication using the generated authentication key.

Description

Terminal identification method, authentication method, Verification System, server, terminal, wireless base station, program and recording medium
The application is dividing an application of following application; Application number: 200680006443.5 (international application no: PCT/JP2006/325258); Denomination of invention: terminal identification method, authentication method, Verification System, server, terminal, wireless base station, program and recording medium, the applying date: on December 19th, 2006.
Technical field
The wireless frequency authentication) etc. the present invention relates to be used for RFID (the Radio FrequencyIdentification: terminal identification method of requirement protection privacy.In addition, the present invention relates to be used for Ubiquitous Network (ubiquitous networking) and the wireless terminal of network security and the authentication method between the server.
The application based on December 19th, 2005 spy in japanese publication be willing to 2005-364522 number and on May 1st, 2006 spy in japanese publication be willing to advocate priority for 2006-127546 number, quote its content here.
Background technology
In recent years, we can say that the such pattern of Ubiquitous Network is popularized.So-called Ubiquitous Network, be meant the information system that can realize like inferior function: utilize computer and network to obtain the state of people or thing, the integral status of keeping watch on this place perhaps provides the information of peripheral situation etc.
In this Ubiquitous Network, what play a significant role is sensor network.So-called sensor network is represented following such conception and its system: the micro radio device is built in each transducer, utilizes the wireless circulation of automatically carrying out information between transducer, and the service that is suitable for this moment is provided according to the data of collecting.
As sensor network, consider to as take precautions against natural calamities, delinquency prevention, safety, medical treatment, environmental problem, the application in field so agriculture.And then, also have air conditioning managing in the office, carry on the car-mounted computer and and the interlock of track road information, the interlock between the car etc.
Transducer has polytype; Except measuring the common like this transducer that utilizes in heat, temperature, water, humidity, sound, light, magnetic, wind, vibration, pressure, acceleration, orientation, also have life signals such as measuring blood pressure, pulse, beats, blood glucose value biology sensor, detect harmful compound or become the transducer etc. of the material of scarce resource.Through making up these transducers, can obtain various information, thus, the application that provides is also for of all kinds.
The field that is utilized is also various, also can send the ecological information of the action of knowing the information relevant with living of people, people or people's the patient's condition, and under the situation of sending this information, the technology of the secret protection in the transmission becomes extremely important.
In addition, in order to be installed on the various transducers, transmitter needs and can make at an easy rate.
Method as the transmission that cheapness can be provided has the method that is called as RFID.This is as through small wireless chip the structure that people or thing discern, manage being used.But this does not consider on the one hand in secret protection.
As one of method that addresses this is that, there are Termination ID and the safety at the terminal in the recognition network to go up the adding method of the Termination ID of dynamic change, promptly utilize the method for hash chain (hash chain).
For example, in utilizing the mode of hash chain (with reference to non-patent literature 1), will be with the RFID mark (tag) of the independent identification of k numbering and the total value S (k of server of network (NW) side; 0) carries out hash i time with hash function (hash function) H; (k i), and utilizes from S (k to obtain S; I) (k is i) as the i time Tag ID for a after carrying out hash with hash function J (is hash function G at non-patent literature 1).At first, mark carries out above-mentioned calculating, and the ID that serves as a mark sends to NW.In the server of NW side, obtain a in advance (k i), and makes the correspondence table with k, and (k, (k, k i) thus, can identify this separately and be labeled as k i) consistent a to find out a that sends from mark the institute of harvesting is underlined.
This mode is characterised in that, if in mark, from memory, delete S (k, 0), (then when this mark was rejected, (k, i), a (k, 0) that also was difficult to from the past inferred a (k, value k-1) to S even if obtained S for k, information i-1).This has utilized this characteristic of inverse operation difficulty of hash function H.In addition because the difficulty of the inverse operation of hash function J, from a that sends (k, i) infer S (k also is difficult i), so, be difficult to infer a that next utilizes (k, i+1).
Thus, the tracking of the mark that the memory analysis of mark or wireless eavesdropping produce is difficulty very, can protect the owner's of mark privacy.
On the other hand; Responding in (response) authentication mode as inquiry (challenge) & at one of employed authentication mode of Ubiquitous Network; Need not exchange between the server and client side value itself of maintaining secrecy that has (having) in advance respectively, server just can Authentication Client (non-patent literature 2, non-patent literature 3).
In above-mentioned inquiry & response authentication mode, server sends the value of the each variation that is called as inquiry (the for example random number RA of the 55th of non-patent literature 3 the page of record) to the client.Here, the method for formation as the value of each variation uses random number usually.
Then; Client combination inquiry and the value of maintaining secrecy (are for example carried out computing; The computing of the MAC (Massage Authentication Code) of the 55th page of record of use non-patent literature 3), the result is returned to server as response (Hk of the 55th page of record of non-patent literature 3).At last, server and client likewise make up inquiry and the value of maintaining secrecy is carried out computing, relatively operation result of self and the response that receives from client, detects whether identical, thereby Authentication Client is the legal client of total secret value.Under the situation of authentication each other, same authentication is carried out in transposing server and client side's effect once more.In addition,, use this random number R B to generate the response this point when generating random number R B, disclose the technology identical with non-patent literature 3 except the client of non-patent literature 3 for non-patent literature 2.
Like this, in inquiry & response authentication mode, in the communication path between the server and client side, the each value that changes of transmitting-receiving, so, do not know that between the server and client side listener-in of total hush values can not be masquerading as client in advance.
Non-patent literature 1:Forward-Secure RFID Privacy Protection for Low-costRFID, big Kubo U.S.A be son also, and the Suzuki good fortune is the youth too, wood true down I (NTT), CSS2003, pp.491-496, in October, 2003
Non-patent literature 2: following ね っ と シ リ one ズ " ュ PVC キ タ ス サ one PVC ス ネ ッ ト ヮ one Network technology ", three residence merits, neat Teng Yang, a bow wisdom, ISBN:4885499186, pp.228-229, in September, 2003
Non-patent literature 3:Applied Cryptography, Second Edition, BruceSchneier, John Wiley&Sons, ISBN 0-471-11709-9, pp.52-57 and 454-459,1996
But, in having utilized the existing method of hash chain,, be difficult to make Termination ID synchronous in NW side and end side using from the terminal to the environment of a direction communication of NW side.And then having maybe the identical such problem of a plurality of Termination ID.
In addition, concerning the ID generation method of having utilized hash chain, (a (k, i)) length more in short-term, the ID of a plurality of wireless terminals might accidental conflict for ID.At this moment, in the NW side, it is difficult that the identification of wireless terminal becomes.In addition, when making ID length become longer, the probability of conflict reduces, and the probability that but can not make conflict is 0.And then, when making ID length elongated, there is the such problem of radio band that consumes.
In addition, in mode in the past, imagined according to the RFID mark only to direction communication of NW.Therefore, (k, sequence i) keeps as table must to calculate a afterwards in advance.This be because, be difficult to make S in the NW server (k, i) with the S of wireless terminal side (k, i) synchronous.In a word, have such problem, that is: RFID increases i, sends to NW, can not utilize wireless environment to receive at the NW side joint, and, can not differentiate i in the NW side and whether be increased.
On the other hand, in above-mentioned inquiry & response authentication mode, each authentication need generate the value of each variation, and exchange each other.Usually, as the value of each variation, most random numbers of using; But,, need the random number systematic function or be used for the resource of the such wireless terminal of electric power that random number calculates in order to generate random number; And, in order to transmit random number, consume radio band and the electric power that is used for radio communication.And, when carrying out authentication each other, because will intercourse inquiry and response, so, in communication steps, need the communication of 4 message, exist the resource of wireless terminal or radio band to be wasted such problem morely.
Especially; As the small-sized mobile radio terminal of cheapnesss such as transducer; Handling property is so not high, and the data volume that wireless terminal carries out proper communication is few, and under the situation that a plurality of wireless terminals communicate simultaneously; The treating capacity of calculating or to be used for the traffic of authentication more, the problem of inquiry & response authentication mode that repeatedly is used for the communication of authentication becomes remarkable.In addition, in small-sized mobile radio terminals such as transducer, need built-in battery to drive for a long time sometimes.This point also problem in inquiry & response authentication mode becomes remarkable.
So; Require such authentication method, authentication each other, and do not need complicated computing function such as public key encryption mode, random number generation, clock; And computational throughput, radio communication step and radio communication amount are few, and it is few to be used for the consumed power of communication of authentication.
Summary of the invention
The present invention considered above situation and accomplished, and its purpose is to provide a kind of terminal identification method, server, terminal, program and the recording medium that can discern a plurality of Termination ID and can carry out the protection privacy of two-way communication in terminal and NW side.In addition, the object of the present invention is to provide a kind of computing that does not need the complicacy in the authentication and the needed radio communication step of authentication and the radio communication amount is few and consumed power is few authentication method, Verification System, terminal, server, wireless base station, program and recording medium.
The present invention accomplishes for solving the above problems, and terminal identification method of the present invention is the terminal identification method that is used for discerning via the said terminal of the communication of the network between server and the above terminal, in both of said server and said terminal; Have the first hash function H and by the determined initial value S in each terminal (k, 0), in said server and each said terminal; According to value S (k; I) calculate interim ID, said S (k, i) be through with the said first hash function H to said initial value S (k; 0) carry out i hash, or carry out based on said initial value S (k; 0), the computing of parameter i and the said first hash function H obtains, and makes the number of times that between said server and said terminal, carries out hash identical, thus; In said server and said terminal, calculate identical interim ID, use said interim ID to discern said terminal.
In terminal identification method of the present invention; In said server and said terminal, (k is i) further to carry out hash at said server and the second total hash function J of said terminal with the said value S that carries out hash; Thus, it is also passable to calculate said interim ID.
In terminal identification method of the present invention; In said server and each said terminal; Carry out i hash with the said first hash function H before; Carry out the pre-treatment relevant, calculate according to the resulting value of hash of said pre-treatment and the said first hash function H also passable as said interim ID with the number of times i of hash.
In terminal identification method of the present invention, the said number of times that carries out hash carries out between said server and said terminal after the communication or authentication more than the fixed number of times, perhaps passed through the set time above after, change also passable.
In terminal identification method of the present invention, in said server, changed after the said number of times that carries out hash, will change said information of carrying out the number of times of hash from said server and notify to said terminal.
In terminal identification method of the present invention, in said server, preserve before changing and interim ID after changing, before changing and the difference of hash number of times after changing also passable.
In terminal identification method of the present invention, in said server, when having received interim ID before changing, with before changing and the difference of hash number of times after changing notify to said terminal, interim ID is also passable in said terminal updating.
In terminal identification method of the present invention, in said server, when having received interim ID after changing, it is also passable to delete the interim ID before changing that said server keeps.
In terminal identification method of the present invention; When said server communicates said terminal; The said terminal of using said server successively and being kept before changing and interim ID after changing, it is also passable to ask said terminal that said server is sent signal.
In terminal identification method of the present invention; In said server; When the interim ID of change; Under the situation that the interim ID at interim ID that newly calculates and other terminal conflicts, before calculating not the interim ID that conflicts with said other terminal, change the hash number of times, it is also passable to calculate new interim ID.
In terminal identification method of the present invention; When the communication of carrying out from said terminal said server; Use the terminal authentication key to carry out the authentication at said terminal, thus, notify the hash number of times information that interim ID upgrades usefulness to said terminal also passable from said server.
In terminal identification method of the present invention; Carrying out from said server during to the communication at said terminal; Use the network authentication key to carry out the authentication of said server; Thus, the interim ID change that the signal that is used for interim ID renewal that said terminal is received reflects in the said terminal is also passable.
In terminal identification method of the present invention; Said server is receiving from said terminal under the situation of the interim ID that is predetermined between said server and the said terminal; The initialization vector that has the value that has nothing in common with each other when generating each the generation is based on said initialization vector, the said first hash function H and said initial value S (k, 0); Calculate the said number of times that carries out hash, it is also passable that said interim ID is carried out initialization.
In terminal identification method of the present invention, said server is carrying out under the initialized situation said interim ID, and said initialization vector and the said number of times that carries out hash are notified to said terminal, notifies the initialization of said interim ID to said terminal passable.
In terminal identification method of the present invention, said terminal is based on said initial value S (k, 0) with by the said initialization vector and the said number of times that carries out hash of said server notification, and it is also passable to calculate said interim ID.
Server of the present invention is the server that communicates with the terminal that is connected via network, comprising: memory cell keeps the identical initial value S (k, 0) of initial value that is kept with said terminal; And interim ID calculates the unit; According to value S (k; I) calculate interim ID; Said value S (k, i) be through utilize hash function H to the said initial value S (k, 0) that said memory cell kept carry out with said terminal in identical i the hash of hash operations, or carry out with based on said initial value S (k; 0), the identical computing of computing in the said terminal of parameter i and said hash function H obtains, said server uses calculates the said interim ID that calculates the unit by said interim ID and discerns said terminal organ.
Terminal of the present invention is the terminal that communicates with the said server that is connected via network, comprising: memory cell keeps the identical initial value S (k, 0) of initial value that is kept with said server; And interim ID calculates the unit; According to value S (k; I) calculate interim ID; Said value S (k, i) be through utilize hash function H to the said initial value S (k, 0) that said memory cell kept carry out with said server in identical i the hash of hash operations, or carry out with based on said initial value S (k; 0), the identical computing of computing in the said server of parameter i, said hash function H obtains, said terminal is used and is calculated said interim ID and the said server that the unit calculates by said interim ID and communicate.
Program of the present invention is by the performed program of computer of the server that communicates with the terminal that is connected via network, comprises the steps: that interim ID calculates step; Generation value S (k; I), (k i) calculates interim ID based on said value S; Said value S (k; I) be through utilize hash function H pair with the identical initial value S (k, 0) of initial value that said terminal is kept carry out with said terminal in identical i the hash of hash operations, or carry out and obtain based on the identical computing of computing in the said terminal of said initial value S (k, 0), parameter i, said hash function H; And the terminal recognition step, use and to calculate the said interim ID that step calculates by said interim ID and discern said terminal.
Program of the present invention is by the performed program of computer at the terminal that communicates with the server that is connected via network, comprises the steps: that interim ID calculates step; Generation value S (k; I), (k i) calculates interim ID based on said value S; Said value S (k; I) be through utilize hash function H pair with the identical initial value S (k, 0) of initial value that said server is kept carry out with said server in identical i the hash of hash operations, or carry out and obtain based on the identical computing of computing in the said server of said initial value S (k, 0), parameter i, said hash function H; And use and to calculate the said interim ID that step calculates by said interim ID and come to communicate with said server.
Authentication method of the present invention is the authentication method in server and the communication between terminals; Said server and said terminal keep shared hash function and authentication information respectively; Said server and said terminal are obtained when said server and said communication between terminals temporary transient shared messaging parameter respectively and are used as authentication and use messaging parameter; Parameter is used based on said authentication information and said authentication in said server and said terminal; Use said hash function to generate authenticate key respectively, the wherein at least one side in said server or said terminal uses the authenticate key that is generated to carry out the authentication between said server and the said terminal.
In authentication method of the present invention; Said server and said communication between terminals are carried out via the wireless base station; And; Use radio communication to carry out between said terminal and the said wireless base station, temporary transient shared wireless communication parameters was also passable when said messaging parameter was the radio communication between said terminal and said wireless base station.
In the authentication method of the present invention; Said terminal and said server keep shared the 1st hash function and the 1st authentication information respectively; Said terminal with messaging parameter and said the 1st authentication information, is used said the 1st hash function based on said authentication, generates the 1st terminal authentication key as said authenticate key; Via said wireless base station the 1st terminal authentication key of said generation is sent to said server; Said wireless base station appends to the said wireless communication parameters between said terminal and the said wireless base station in said the 1st terminal authentication key from said terminal with messaging parameter as said authentication, sends to said server, and said server receives the additional said authentication in said the 1st terminal authentication key and said wireless base station and uses messaging parameter from said wireless base station; Based on the authentication of said reception with messaging parameter and said the 1st authentication information; Use said the 1st hash function, generate the 2nd terminal authentication key as said authenticate key, whether the 2nd terminal authentication key of the 1st terminal authentication key and said generation that detects said reception is identical; Thus, it is also passable authentication to be carried out at said terminal.
In authentication method of the present invention; Said terminal and said server keep shared the 2nd hash function and the 2nd authentication information respectively; Said server further based on the authentication of said reception with messaging parameter and said the 2nd authentication information, use said the 2nd hash function, generate the 1st network authentication key as said authenticate key; Via said wireless base station the 1st network authentication key of said generation is sent to said terminal; Said terminal further receives said the 1st network authentication key via said wireless base station from said server, and the said authentication of using when generating said the 1st terminal authentication key is used said the 2nd hash function with messaging parameter and said the 2nd authentication information; Generation is as the 2nd network authentication key of said authenticate key; Whether the 2nd network authentication key of the 1st network authentication key and said generation that detects said reception is identical, and thus, it is also passable that said server is carried out authentication.
In authentication method of the present invention; Said terminal and said server keep shared the 1st hash function and the 1st authentication information respectively, and said server further sends to said wireless base station with said the 1st authentication information, said wireless base station further based on said authentication with messaging parameter and said the 1st authentication information that receives from said server; Use said the 1st hash function; Generation sends to said terminal as the 1st network authentication key of said authenticate key with said the 1st network authentication key that is generated, and said terminal further receives said the 1st network authentication key from said wireless base station; Based on said authentication with messaging parameter and said the 1st authentication information; Whether use said the 1st hash function, generate the 2nd network authentication key as said authenticate key, it is identical with said the 2nd network authentication key that is generated to detect said the 1st network authentication key that receives; Thus, it is also passable said server to be carried out authentication.
In authentication method of the present invention; Said terminal and said server keep shared the 2nd hash function and the 2nd authentication information respectively; Messaging parameter use based on said the 2nd authentication information and the said authentication when generating said the 2nd network authentication key, used in said terminal, uses said the 2nd hash function, and generation is as the 1st terminal authentication key of said authenticate key; Said the 1st terminal authentication key that generates is sent to said wireless base station; Said wireless base station appends to said 1st terminal authentication key from said terminal as said authentication with messaging parameter with the said wireless communication parameters between said terminal and the said wireless base station, sends to said server, and said server receives said the 1st terminal authentication key and said authentication and uses messaging parameter from said wireless base station; Based on the authentication that receives with messaging parameter and said the 2nd authentication information; Use said the 2nd hash function, generate the 2nd terminal authentication key as said authenticate key, whether the 1st terminal authentication key that detection receives is identical with the 2nd terminal authentication key of generation; Thus, it is also passable authentication to be carried out at said terminal.
At authentication method of the present invention, said wireless communication parameters is terminal recognition symbol, frame number, groove number, temporal information, the identifier of said wireless base station, the identifier of paging zone, said wireless base station the desired value that mixes situation that the communication of communication carrier number, the expression said wireless base station report that the end packet number of service, said wireless base station provide is provided, the described end packet in said terminal number, the communication carrier of said terminal in communication number, or to be used in the random number and their combination of Control on Communication also passable.
Verification System of the present invention; Be that terminal and server carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep the Verification System of shared hash function and authentication information respectively, and said terminal comprises: the end side parameters for authentication obtains the unit, and temporary transient shared messaging parameter is used messaging parameter as authentication when obtaining the communication between said terminal and said wireless base station; End side authenticate key generation unit is obtained the said authentication that obtains the unit with messaging parameter, said authentication information and said hash function based on said end side parameters for authentication, generate the 1st authenticate key; And end side authenticate key transmitting element; Via said wireless base station said the 1st authenticate key is sent to said server; Said wireless base station comprises: wireless base station side parameters for authentication obtains the unit, and temporary transient shared messaging parameter is used messaging parameter as authentication when obtaining the communication between said terminal and said wireless base station; And transmission unit; Said wireless base station side parameters for authentication is obtained the said authentication that obtains the unit append to said the 1st authenticate key that send at said terminal with messaging parameter; And send to said server; Said server comprises: the server side receiving element, added said 1st authenticate key of said authentication with messaging parameter from the reception of said wireless base station; Server side authenticate key generation unit, the said authentication that receives based on said server side receiving element generates the 2nd authenticate key with messaging parameter, said authentication information and said hash function; And the server side authentication ' unit, whether the 1st authenticate key of the 2nd authenticate key and said reception that detects said generation is identical, thus, carries out the authentication at said terminal.
Terminal of the present invention is employed terminal in the Verification System; The said terminal and the server of this Verification System carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively, and this terminal comprises: the end side parameters for authentication obtains the unit, obtain with the wireless base station between when communicating by letter temporary transient shared messaging parameter use messaging parameter as authentication; End side authenticate key generation unit is obtained the said authentication that obtains the unit with messaging parameter, said authentication information and said hash function based on said end side parameters for authentication, generate the 1st authenticate key; And end side authenticate key transmitting element, via said wireless base station said the 1st authenticate key is sent to said server.
Wireless base station of the present invention is employed wireless base station in the Verification System; The terminal of this Verification System and server carry out authentication via said wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively; Said wireless base station comprises: wireless base station side parameters for authentication obtains the unit, obtains when between said terminal and wireless base station, communicating by letter temporary transient shared messaging parameter and uses messaging parameter as authentication; And transmission unit, said wireless base station side parameters for authentication is obtained the said authentication that obtains the unit append in the authenticate key that sends at said terminal with messaging parameter, send to said server.
Server of the present invention is an employed server in the Verification System; The terminal of this Verification System and said server carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively, and said server comprises: the server side receiving element, added 1st authenticate key of authentication with messaging parameter from the reception of said wireless base station; Server side authenticate key generation unit, the said authentication that receives based on said server side receiving element generates the 2nd authenticate key with messaging parameter, said authentication information and said hash function; And the server side authentication ' unit, whether the 1st authenticate key of the 2nd authenticate key and said reception that detects said generation is identical, thus, carries out the authentication at said terminal.
Program of the present invention is through the performed program of the computer at employed terminal in the Verification System; The said terminal and the server of this Verification System carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Comprise the steps: that the end side parameters for authentication obtains step, obtain with the wireless base station between when communicating by letter temporary transient shared messaging parameter use messaging parameter as authentication; The end side authenticate key generates step, based on being obtained said authentication that step obtains by said end side parameters for authentication with messaging parameter, and shared hash function of said server and the authentication information shared with said server, generates the 1st authenticate key; And end side authenticate key forwarding step, will send to said server by said the 1st authenticate key that said end side authenticate key generation step generates via said wireless base station.
Program of the present invention is through the performed program of the computer of employed wireless base station in the Verification System; The terminal of this Verification System and server carry out authentication via said wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively; Comprise the steps: that wireless base station side parameters for authentication obtains step, obtain when between said terminal and wireless base station, communicating by letter temporary transient shared messaging parameter and use messaging parameter as authentication; And transmitting step, said wireless base station side parameters for authentication is obtained the said authentication that step obtains append in the authenticate key that sends at said terminal with messaging parameter, send to said server.
Program of the present invention is through the performed program of the computer of employed server in the Verification System; The terminal of this Verification System and said server carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Comprise the steps: the server side receiving step, receive from said wireless base station and added 1st authenticate key of authentication with messaging parameter; The server side authenticate key generates step, with messaging parameter, and shared authentication information in said terminal and the hash function shared with said terminal, generates the 2nd authenticate key based on the said authentication that is received by said server side receiving step; And the server side authenticating step, detect whether generate the 1st authenticate key of the 2nd authenticate key that step generates and said reception by said server side authenticate key identical, thus, carry out the authentication at said terminal.
Recording medium of the present invention is the recording medium that has write down the embodied on computer readable of above-mentioned each program.
In the present invention, between the server and terminal of network side, make the hash function synchronously (make its identical) of the formation base of the interim ID that uses as terminal recognition.And then, when server side changes interim ID, select the hash number of times, with inconsistent with the interim ID that other terminal is given.Thus, obtain inconsistent interim ID with the interim ID at other terminal.In addition, interim ID can be synchronous at network side and end side, so, can utilize the interim ID identification terminal of dynamic change.Use this interim ID, carry out the communication between terminal and the server, can prevent that the third party from carrying out the tracking to the terminal, and the effect of the communication at the terminal of protecting privacy is provided thereby play.
In addition, in the present invention,,, also need not encrypt except than specifying interim ID itself more can practice thrift the radio band through specifying the hash number of times.That is, with the position appearance ratio of the interim ID at the terminal of identification over ten billion platform, the hash number of times just can show so that very short position is long, so, upgrade that needed information is less to get final product, can effectively utilize wireless frequency band.In addition, when the interim ID of next utilization itself is sent to wireless terminal,, prevent that the effect of following the tracks of from disappearing by under the situation about eavesdropping, so, need encrypt this part, still, need not carry out such encryption in the present invention.
In addition, according to the present invention, and compared in the past; Can reduce the quantity of the step of the mutual authentication between wireless terminal and the authentication management server, so radio communication step and radio communication amount that wireless terminal carries out are less; Especially, need not regenerate and receive and dispatch in the time dependent parameters for authentication of infinite interval, therefore; The computational throughput of wireless terminal and radio communication amount are less; And, do not use the computing function of the complicacy of public-key cryptography mode or random number generation etc., just can play the effect of the few authentication of the consumed power of the communication that can be used for authentication.
In addition; According to the present invention, temporary transient shared a plurality of messaging parameters are utilized as parameters for authentication in the time of can being combined in the communication between wireless terminal and the wireless base station, so; Can make the pattern of variation of value of parameters for authentication more complicated; As a result of, the randomness of authenticate key increases, and plays the effect that authenticating safety improves.
Description of drawings
Fig. 1 is the block diagram of structure of the data communication system of the expression terminal identification method of having used first execution mode of the present invention.
Fig. 2 representes the block diagram of the computational methods of employed interim ID in the first embodiment.
Fig. 3 is the block diagram of example of representing the memory contents of employed in the first embodiment ID management DB 104.
Fig. 4 is a flow chart of representing employed in the first embodiment interim ID product process.
Fig. 5 is a flow chart of representing employed in the first embodiment fixing (permanent) ID retrieval flow.
Fig. 6 is used to explain the flow chart from the upload (uploading) at the terminal of first execution mode.
Fig. 7 is used to explain the flow chart from the dowlodad (download) at the terminal of first execution mode.
Fig. 8 is a precedence diagram of representing to be used in the first embodiment interim ID is carried out initialized interim ID initialization process.
Fig. 9 representes to use in the first embodiment interim ID initialization vector to calculate the key diagram of the order of interim ID.
Figure 10 is the block diagram of structure of the Verification System of expression second execution mode.
Figure 11 is the key diagram of explanation summary of the authentication method in wireless terminal 1101 and the authentication management server 1103 in second execution mode.
Figure 12 is illustrated in second execution mode authentication of using random number and the MAC-Termination ID derivation precedence diagram in proper order with messaging parameter.
Figure 13 is the functional block diagram that is illustrated in second execution mode as the structure of the wireless terminal 1101 of request authentication side.
Figure 14 is the functional block diagram that is illustrated in the structure of the authentication management server 1103 that carries out authentication one side in second execution mode.
Figure 15 is explanation generates the method for authenticate key in second execution mode a key diagram.
Figure 16 is the precedence diagram that the action in whole authentication when wireless terminal begins authentication to the authentication management server requests in second execution mode is described.
Figure 17 is the precedence diagram that the action in the whole authentication when authentication management server begins authentication to wireless terminal requests in second execution mode is described.
Figure 18 is the block diagram of the system configuration of expression third embodiment of the invention.
Figure 19 is the precedence diagram that is illustrated in the handling process of whole system when wireless terminal begins authentication to ID& authentication management server requests in the 3rd execution mode.
Figure 20 is the precedence diagram that is illustrated in the handling process of whole system when ID& authentication management server begins authentication to wireless terminal requests in the 3rd execution mode.
Figure 21 is the precedence diagram of the handling process of the whole system when being illustrated in the 3rd execution mode interim ID initialization process.
Embodiment
Below, with reference to accompanying drawing, each execution mode of the present invention is described.
First execution mode
At first, the main points to this execution mode describe.At first, be two-way communication between assumed wireless terminal and the NW.When carrying out inclusive authentication each other, will represent that by the ID management server recruitment d (integer more than 0) and the NW authentication information of i (integer more than 0) of the generation (version) of ID calculates together.The ID management server is kept at (the interim ID reservation of the execution mode of afterwards stating) in the ID management DB (database) with recruitment d; And then notice is given wireless terminal (the terminal authentication response of the execution mode of afterwards stating), thus; I on wireless terminal and the ID management server (the preservation destination of ID management server is the ID management DB) increases d; The S of wireless terminal (k, i) with the ID management server on S (k, i) synchronous all the time.
For new ID and other the conflict mutually of ID of wireless terminal that has been utilized, must calculate the recruitment d of i.Therefore, be configured in the next ID that is used in the wireless terminal of ID management DB of ID management server registration of NW side.Clash if in the time will registering the ID that has registered again, detect ID, then refuse registration the ID management DB.If no conflict occurred for ID, then be registered to the ID management DB.Under unaccepted situation, i is increased, generate next ID, register once more.In the ID management server, measure the increase number of times of the i till successfully registering, with its recruitment d as i.
Wireless terminal by the recruitment d of notice i is implemented d hash function, generates new ID.Then, with i+d as new i.So, can generate the exclusive interim ID of network.
In addition, in the network between ID management server and wireless terminal, utilize interim ID to come identified wireless terminal, so, even the access net (access network) of eavesdropping wireless terminal also is difficult to follow the tracks of wireless terminal.
Each wireless terminal sends variable ID according to the time, under the situation of the tracking that prevents wireless terminal, also can not notify the side to NW from different wireless terminals with same ID at one time.Thus, in the NW side, identified wireless terminal can and be deposited with preventing to follow the tracks of uniquely, and can be transferred to the destination that needs.
In addition, in the access net of harvesting wireless terminal, because above-mentioned utilization is according to the time and variable ID comes identified wireless terminal, so, the tracking of the wireless terminal very difficulty that becomes.
Then, this execution mode is described in more detail.Fig. 1 is the overall diagram of this execution mode of expression.Wireless terminal 101 is discerned by the interim ID as interim ID, in addition, as general ID, is discerned by fixing (permanent) ID.Interim ID and fixedly ID in all wireless terminals, be unique, must discern specific wireless terminal.
Wireless terminal 101 is the information of collecting sensor etc. and information and interim ID is sent to terminal 102 together.At this moment, ID management server 103 carries out relaying, in ID management server 103, is transformed to fixedly ID from interim ID, and fixedly ID and sensing data send to terminal 102.Perhaps; The set information of transducer etc. 102 is sent with fixing ID from the terminal together; In ID management server 103, be transformed to interim ID from fixing ID; Call out wireless terminal 101 with interim ID from ID management server 103, the authentication information of set information of the transducer of wireless terminal self terminal 102 in 101 future etc. and NW receives together.
103 pairs of ID management DB of ID management server 104 are carried out access, obtain interim ID according to fixing ID, or obtain fixedly ID according to interim ID, or generate new interim ID.The corresponding relation of in store fixedly ID and interim ID in ID management DB 104.Wireless base station 105 stops the radiolink of wireless terminal 101, and is connected with network 106.Wireless base station 105 is connected with network 106 with ID management server 103.In network 106, come identified wireless terminal 101 through interim ID.Thus, between the radio zone of the network 106 between ID management server 103 and the wireless base station 105 and wireless base station 105 and wireless terminal 101, the tracking of wireless terminal is difficulty very.In addition, ID management server 103 is connected with network 107 with terminal 102.In network 107, utilizing fixedly, ID comes identified wireless terminal.
In network 107, can catch communication to each wireless terminal, still, because unclear the harvesting in which wireless base station, so, the position that can not follow the tracks of wireless terminal.
For example, consideration is through the situation of the admission person's in RFID tracking rally meeting-place track.At this moment, so-called wireless terminal 101 is to be attached to distribute to rally transducer admission person, that can measure the position in the meeting-place and the RFID mark that is associated with it etc.Send admission person's positional information by the set time from RFID.The information of being sent receives by being arranged on the wireless base station 105 of rally in the meeting-place,, is kept in the terminal 102 via network 106, ID management server 103, ID management DB 104 and network 107 as admission person's position (track).
Terminal 102 is according to admission person's track, will with admission person near little (booth) information of being associated send to the portable phone that admission person holds with mail.
In addition, afterwards, admission person uses other PC (personal computer) that terminal 102 is conducted interviews, thus, also can confirm self near little.
Under the situation of such example, utilize the effect of this execution mode, with respect to the third party, admission person near what kind of little such privacy protected.
In addition, rally admission person when coming in and going out the meeting-place, from the terminal 102 be used for the setting of wireless terminal 101 transmission, also can change the setting in the time interval that wireless terminal 101 sends.For example, set per 1 minute in the time of in being in the meeting-place for and send, in the time of in not being in the meeting-place,, carry out the setting of position transducer and RFID with per mode of sending in 5 minutes.
Fig. 2 representes the computational methods of interim ID.Fixedly ID is that wireless terminal 101 and the ID management server 103 total S (k, 0) of k are as security information (step S201).In Fig. 2, owing to represent that fixedly ID is the situation of k, so, omit mark k.Wireless terminal 101 utilizes hash function (hash function) H to hash kind (hashseed) S (k respectively with ID management server 103; 0) carries out i hash (hashes); (k, i) (step S202) will utilize hash function J by S (k to obtain S; I) (k is i) as interim ID (step S203) for a that obtains after the hash.At this moment, wireless terminal 101 and ID management server 103 (ID management DB 104) preserve in advance k and S (k, i).Then, in order to calculate the following interim ID (next interim ID) that utilizes, utilize hash function H to S (k; I) carry out hash d time, obtain S (k, i+d) (step S204); (k, (k is i+d) as next interim ID for a that i+d) obtains after the hash to S will to utilize hash function J.Ask the calculating of next interim ID in wireless terminal 101 and ID management server 103, to carry out independently.In Fig. 2, it is 1 situation that illustration goes out d.
Fig. 3 illustrates the example of the memory contents of ID management DB 104.In ID management DB 104; Store several fixedly ID and the group of (interim ID, interim ID pointer, hash number of times), up-to-date hash kind S (k according to each wireless terminal; I) and initial hash kind S (k, 0), interim ID update time, the initialization upgraded behind interim ID last time use interim ID.The field (field) that needs when in addition, initialization is the initialization process of the interim ID that only after carrying out, states with interim ID.In addition, so that different modes is set initial hash kind by each wireless terminal, still, the wireless terminal that there is no need to reach all is unique this degree of value (that is, not allowing to become the value identical with other wireless terminals fully).And then initial hash kind and initialization are with interim ID changed content and keeping predefined value not in service.
ID management server 103 with the interim ID of certain wireless terminal 101 after communication or the authentication carried out more than the fixed number of times or after more than the set time, upgrade.Fig. 4 representes the flow process upgraded.In Fig. 4, expression is upgraded the situation of interim ID through above back of set time, still, under the situation of upgrading interim ID after communication or the authentication carried out more than the fixed number of times, also is same.ID management server 103 at first is connected with ID management DB 104, and fixedly IDk obtains hash kind S (k, i) (step S404, the S402) of interim ID as key.Then, (k i) carries out hash one time, and (k i+1), carries out hash by hash function J to it, thus, calculates a (k, i+1) (step S403) to generate S to the hash kind S of interim ID by hash function H.(k i+1) is registered to ID management DB 104, preengages interim ID (step S404) with a that calculates.ID management DB 104 compares with the interim ID (a) of all wireless terminals of being registered, as inconsistent, then can preengage, if consistent, then can not preengage (step S404a), and its result is turned back to ID management server 103 (step S405).If ID management server 103 can not be preengage for returning, then further (k i+1) carries out hash one time with S with hash function H; (k i+2), calculates a (k that is obtained after to its hash by hash function J to obtain S; I+2) (step S406), and it is registered to ID management DB 104, preengage interim ID.Like this, carry out hash by hash function H, can be until ID management server 103 to the interim ID of ID management DB 104 reservations.When this hash number of times is made as d, next the interim ID that utilizes below become a (k, i+d).When next interim ID was registered to ID management DB 104, (k was i+d) as new hash kind with S.In the next interim ID of next time, (k, (k i+d), repeats above-mentioned steps to new S i) to become S.
Each interim ID has interim ID pointer.Interim ID pointer, the hash number of times that is used to generate are related with interim ID foundation, and are stored in (step S407, S408, S409) in the ID management DB 104.For interim ID pointer, the current interim ID that should utilize of 0 expression ,-1 is expressed as previous interim ID.That is to say that the interim ID that should utilize relatively later on preestablishes+1 (step S404a) interim ID pointer; When upgrading interim ID pointer (step S408); To deducting 1 with interim ID pointer (have+1,0 ,-1 in any value) that fixing ID sets up related all interim ID, thus, the interim ID pointer of the current interim ID that should utilize is 0; The interim ID pointer of previous interim ID is-1, and the interim ID pointer of preceding twice interim ID is-2.Then, from the ID management DB 104 interim ID of the deletion interim ID (step S408) littler than-1.
Then, Fig. 5 illustrate 103 pairs of ID management DB of ID management server 104 carry out access, according to the fixing flow process of the interim id information of step and the renewal ID management DB 104 of ID of interim ID retrieval.
103 pairs of ID management DB of ID management server 104 are sent the fixedly ID retrieval request (step S501) that contains interim ID.Having received fixedly, the ID management DB 104 of ID retrieval request contrasts with ID management DB 104 interior all interim ID.Under the situation of unanimity, confirm fixedly ID, and obtain interim ID updated time last time, with related interim ID pointer, the hash number of times (step S502) of ID foundation temporarily.With fixedly ID, the last time obtained interim ID updated time, interim ID pointer, hash number of times as parameter, and, respond as fixing ID retrieval, send to ID management server 103 (step S503).The ID management server 103 that receives after fixedly the ID retrieval responds is confirmed interim ID pointer; At interim ID pointer (the interim ID of last time upgrades under the case of successful) under 0 the situation; With specifying the fixedly old interim ID deletion of ID to ask to send to (step S504) in the ID management DB 104, deleting the interim ID pointer corresponding with specified fixedly ID is-1 interim ID (step S505).Then, current time and last time interim ID updated time difference upgrade under the long at interval situation than interim ID, carry out the product process (Fig. 4) (step S506) of interim ID.ID management server 103 confirms to be used to be transferred to the hash number of times (step S507) of wireless terminal 101.Be (under the situation of the renewal failure of the interim ID of last time) under-1 the situation at interim ID, the hash number of times conduct of the fixedly ID retrieval response that will receive from ID management DB 104 is transferred to the hash number of times (step S508) of wireless terminal 101.Current time and last time interim ID updated time difference upgrade under the short at interval situation than interim ID; The hash number of times that is transferred to wireless terminal 101 is made as 0 (step S509); Current time and last time interim ID updated time difference upgrade long at interval than interim ID or situation about equating under, the hash number of times that will in interim ID product process (Fig. 4), obtain is as the hash number of times (step S507) that is transferred to wireless terminal 101.
As stated, take synchronously and carry out hash at wireless terminal 101 and ID management server 103, still; If hypothesis is unsettled communication path; Then since the reception and registration of ACK less than the reception and registration of the ACK of, ACK less than etc., even repeatedly communicate, can not obtain synchronous completely.Therefore, detect once the synchronous deviation of amount and the fixedly ID retrieval flow stream that restorable method is Fig. 5.
Then, explain how to carry out actual data communication.
At first, Fig. 6 representes to upload data conditions from wireless terminal 101 to terminal 102.At first, in wireless terminal 101, generate terminal authentication key (step S601).Then, interim ID, terminal authentication key, data as parameter, are sent terminal authentication request (step S602) to terminal 102.At this moment; The ID management server 103 that communicating by letter of wireless terminal 101 and terminal 102 carried out relaying since the unclear wireless terminal 101 that the terminal authentication request is sended over are which wireless terminal and whether are legal terminal; So the data in advance that receives keeps.Then, ID management server 103 is transformed to fixedly ID according to the fixedly ID retrieval (step S603) of flow process of Fig. 5 from interim ID, thus, confirms to send the wireless terminal 101 (step S604) of terminal authentication request.In addition, if need to upgrade interim ID, then obtain to upgrade needed hash number of times d.Then, utilize this terminal authentication key, confirm that fixed wireless terminal is legal transmitting terminal.Then, generate the NW authenticate key (step S605) of oneself, send (step S606) to wireless terminal 101 with the terminal authentication response.The parameter of terminal authentication response is interim ID, NW authenticate key, hash number of times.The hash number of times utilizes the hash number of times of being confirmed by ID management server 103 in the fixedly ID of Fig. 5 retrieval flow.When wireless terminal 101 receiving terminal authentication responses (step S607), utilize the NW authenticate key, confirm data are carried out the legitimacy of the NW device (ID management server 103) of relaying.Then, send authentication to ID management server 103 and accomplish (step S608).Receive that ID management server 103 that authentication accomplishes will keep to the data at terminal 102 and fixedly ID send to terminal 102 (step S609) together.In addition, wireless terminal 101 with hash function H to S (k i) carries out hash by the hash number of times d of terminal authentication answer notification, calculate S (k, i+d), will (k be i+d) as the interim ID (step S610) of following use with a of hash function J after to its hash.After, (k, (k i+d), repeats above-mentioned flow process i) to be made as S with new S.
Then, Fig. 7 representes 102 situation to wireless terminal 101 data download from the terminal.Basically identical with uploading of data, still, the fixedly ID that destination wireless terminal 101 will be sent in terminal 102 sends to ID management server 103 (step S701) with the transmission data.The fixedly ID that ID management server 103 will receive is transformed to interim ID (step S702, S703), and utilizes the terminal call function (step S704) of wireless base station 105, and interim ID is called out (step S705) as parameter.Wireless terminal 101 after the call accepted is to carry out access with the same step of data upload to terminal 102.Upload and download be not both data and the terminal authentication request is sent together, still and the terminal authentication response send together.In addition, in ID management DB 104, under the situation that a plurality of interim IDs related with same ID foundation are arranged, ID management server 103 need be called out with each interim ID, till access success.
As the example of uploading, the information of the autobiography sensor of looking ahead sends to terminal 102 from wireless terminal 101.For example, be used under the situation of delinquency prevention, beginning because of window-glass is broken to send, the house that security company uses terminal 102 to detect to have wireless terminal 101 unusual from wireless terminal 101.In addition, carry out regular temperature survey, sent to terminal 102 by wireless terminal 101, wireless terminal 101 adjustment on every side etc. can be carried out according to the temperature of being sent in terminal 102.
As the example of downloading, consider the measuring condition of transducer or the setting of method of measurement.For example, can per 1 minute or carried out the setting of the open/close switching of transducer, the interval time of measurement of transducer etc. in per 10 minutes.If the situation that temperature communicated when above in the several years then also can be carried out the setting of temperature threshold.
In addition, terminal 102, ID management server 103, ID management DB 104 can not confirm whether the hash number of times is sent to wireless terminal exactly in the terminal authentication response.Therefore; In wireless terminal, do not carry out the generation (not execution in step S610) of ID; Old interim ID might be utilized when communicating by letter next time; Therefore, be before 0 interim ID is utilized at interim ID pointer, the interim ID pointer that must delete record in ID management DB 104 is-1 interim ID (deleting temporary pointer at step S505 is-1 interim ID).
In addition, in the above-described embodiment, ID management server 103 is described as different devices with ID management DB 104, still, the present invention also can be used for situation that ID management server and ID management DB are designed as one.
In addition, in the above-described embodiment, at server side (ID management server 103 with ID management DB 104) and wireless terminal 101 among both; As shown in Figure 2; Utilize hash function H to carry out hash (S (i+d)) repeatedly from hash kind S (i), and then, the interim ID of a (i+d) conduct that will obtain through utilizing hash function J to carry out hash; But, also can in server side and wireless terminal side, omit the hash of hash function J.In this case, make the hash number of times of hash function H synchronous also very important at server side and end side.
But, as stated, in server side and wireless terminal side, omit the hash of hash function J; As interim ID, use S (i) or S (i+d) as interim ID, if only like this; Then might eavesdrop radio communication as the S (i) of interim ID; It is carried out hash, thus, infer that the S (i+d) of conduct interim ID next time just realizes easily.
In this case, the formation of function is studied, thereby can be made interim ID from the third party's the tracking difficulty that is directed against the terminal through following that kind.
For example, (here, function H utilizes hash function H that independent variable is carried out the function of hash, and function XOR is the function of the logic XOR of fetch bit string to constitute S (i+1)=H (S (i) XOR (i+1)).)。Perhaps, for example constitute S (i+1)=H (S (0) XOR i).In these constitute, utilize the i that does not flow to wireless portion, carry out the processing of XOR function, carry out hash then.Therefore, even third party's eavesdropping also is difficult to infer the S (i+1) as the interim ID of next time.
This structure is not limited to XOR, also can be other functions.Important aspect is not to be intactly S (i) or initial value S (0) as current interim ID to be carried out hash and make the S (i+1) as next interim ID; At first, to current interim ID, utilize and carry out pre-treatment with the promptly relevant function of the part that does not flow to wireless portion with the number of times i of hash; Then; Interim ID to having carried out pre-treatment carries out hash, thus, obtains next interim ID.
As stated; S (i) from as interim ID at first carries out the pre-treatment promptly relevant with the number of times i of hash with the part that does not flow to wireless portion, and makes the S (i+1) as next interim ID through it being carried out hash; Thus, also be difficult to the interim ID that infers even can make by eavesdropping.
In addition, the timing considerations that updates stored in the interim ID updated time of ID management DB 104 has various, and for example, considering has: in the step S602 of Fig. 6, ID management server 103 receives the timing behind the new ID from wireless terminal 101; Perhaps in the step S606 of Fig. 6, ID management server 103 sends timing from the terminal authentication response to wireless terminal 101 etc.In addition, the renewal of hash number of times that is stored in ID management DB 104 is regularly also various, for example, considers the situation of carrying out at the step S404a of Fig. 4.
In addition, in above-mentioned explanation, as shown in Figure 6; Under the situation of wireless terminal 101 requesting terminal authentications; If satisfy the condition of " current time-last time, interim ID updated time>ID upgraded at interval ", then upgrade interim ID, still temporarily; Also can after more than the set time, upgrade regardless of having or not the terminal authentication request.
Then, in the processing of explanation before this, under the restorable situation of synchronous deviation that can not make between wireless terminal 101 and the ID management server 103, the processing that is used to eliminate such synchronism deviation describes.
As stated, the once synchronism deviation of amount about wireless terminal 101 and ID management server 103 can restore to the original state.But, be cut off at power supply and wait some reason to cause can not proceeding processing under the situation that the content at the memory of the inside of wireless terminal 101 disappears in wireless terminal 101 sides because of wireless terminal 101, synchronism deviation is restored to the original state.Therefore, in this case,, make and between wireless terminal 101 and ID management server 103, obtain once more synchronously no matter the state of wireless terminal 101 and ID management server 103 how, carries out the initialization (below be called interim ID initialization process) of interim ID.
Fig. 8 is the order of expression when carrying out the ID initialization process; Roughly the same with order shown in Figure 6; But; In the step S606a corresponding,, different with the processing that S610 distinguishes corresponding step S603a and S610a with the step S603 of Fig. 6 except replacing the hash number of times and send on the interim ID vector this point the difference sending interim ID hash number of times with the step S606 of Fig. 6.In addition, order shown in Figure 8 is also carried out when the dispatching from the factory of wireless terminal 101.
Be judged as under the situation that synchronism deviation takes place between wireless terminal 101 and the ID management server 103; Likewise generate terminal authentication key (step S601) with Fig. 6; And with interim ID, terminal authentication key, data as parameter, the terminal authentication request is sent (step S602) to terminal 102.In addition, be judged as the situation of synchronism deviation as wireless terminal 101, have following situation: for example as being not legal terminal, self radio terminal 101 is not by the situation of ID management server 103 authentications; The content disappearance that wireless terminal 101 detects the memory of self waits some unusual situation etc.In addition and the interim ID that sends together of terminal authentication request, use between wireless terminal 101 and ID management server 103 by the predetermined interim ID of each wireless terminal (the interim ID that is used for the special use of interim ID initialization process).This initialization for example is stored in advance when the dispatching from the factory of wireless terminal 101 with interim ID and is arranged in the inner nonvolatile memory of wireless terminal 101 etc.In addition, about ID management DB 104, initialization is redefined for the field of initialization with interim ID with interim ID.
ID management server 103 is used interim id field with reference to the initialization of ID management DB 104, judges whether the interim ID that request is sent together with terminal authentication is consistent with interim ID with any one initialization.If consistent with the interim ID that sends, then obtain with consistent initialization with the corresponding fixedly ID of interim ID, and be judged as wireless terminal 101 and detect synchronism deviation, and carry out interim ID initialization process (step S603a).
Fig. 9 representes the generation step of the interim ID in the interim ID initialization process.At first, ID management server 103 generates interim ID initialization vector IV (step S801).At this moment, the identical vector of interim ID initialization vector IV that generates before ID management server 103 can not generate therewith.Specifically, consider to use random number to generate the method for interim ID initialization vector IV, perhaps; Preestablish the initial value of interim ID initialization vector IV; Generate under the situation of initialization with interim ID initial, use this initial value, after this; Interim ID is used in each generation initialization, just makes the method for interim ID initialization vector IV increase predetermined number (for example " 1 ") etc.
Then, ID management server 103 is according to total initial hash kind S (k, 0 between wireless terminal 101 and ID management server 103; 0) (identical with above-mentioned initial hash kind S (k, 0)) and interim ID initialization vector IV generate hash kind S (k; 0, IV) (step S802).Then, ID management server 103 utilize hash function H to hash kind S (k, 0, IV) carry out hash i time; (IV) (step S803) will be from hash kind S (k for k, i to obtain hash kind S; I, (k, i is IV) as interim ID (step S804) IV) to carry out a that hash obtains by hash function J.In addition, hash number of times i and above-mentioned situation are same, increase one by one successively since 1, up to the interim ID that is generated be that (k, i's a IV) do not conflict.
Then, ID management server 103 carries out the initialization of the registration (entry) on the ID management DB 104 corresponding with the fixedly ID that formerly obtains.That is, delete the group that constitutes by the interim ID related, interim ID pointer, hash number of times fully with the fixedly ID foundation that is obtained.In addition, to the field of interim ID set a (k, i, IV); Field to interim ID pointer sets 0, and the field of hash number of times is set above-mentioned hash number of times i, and the field of interim ID updated time is set the moment of having carried out initialization process; To the field of hash kind set hash kind S (k, i, IV).
Then; ID management server 103 is same with the situation of Fig. 6 with ID management DB 104; After carrying out wireless terminal authentication and NW authenticate key generation (step S604 and step S605), the terminal authentication response that will add interim ID, NW authenticate key, interim ID hash number of times (hash number of times i), interim ID initialization vector sends to wireless terminal 101 (step S606a).Then, the processing of step S607~S609 is likewise carried out with the situation of Fig. 6 in wireless terminal 101, wireless base station 105, ID management server 103, terminal 102.Then, wireless terminal 101 uses hash kind S (k, 0 that self keeps; 0), responds interim ID hash number of times and the interim ID initialization vector IV that notifies with terminal authentication, to generate S (k, i with ID management server 103 same steps; IV) and a (k; I, IV), respectively as hash kind and interim ID (step S610a).
In addition, in order to calculate the interim ID (the interim ID of NEXT) that utilizes next time, by hash function H to hash kind S (k; I IV) carries out d hash (in Fig. 9, illustration d is 1 situation); Obtain S (k, i+d, IV) (step S805); (k, i+d IV) are used as next interim ID (step S806) to a that will be obtained its hash by hash function J.In addition; In Fig. 8, the order based on the interim ID initialization process of Fig. 6 is illustrated, still; If the data that should not upload to terminal 102; Then can data be attached in the terminal authentication request as parameter, in addition, need not send data to terminal 102 from ID management server 103.
In above-mentioned explanation; As with the RFID of transducer interlock illustration a plurality of execution modes; But; Method of the present invention is not limited to the RFID with the transducer interlock, both can be used as the RFID mark that is used for commodity identification that in circulation, uses and has used, and also goes for as portable phone communication mode arbitrarily.
As stated, in this execution mode, between the ID management server 103 and wireless terminal 101 of network 106 sides, make the hash number of times synchronous (identical) of the formation base that becomes Termination ID.And then, by ID management server 103 change Termination ID the time, select the hash number of times, so that inconsistent with the Termination ID of giving other-end.Thus, can access and the inconsistent Termination ID of the Termination ID of other-end (interim ID).In addition, interim ID can be synchronous in network 106 sides and wireless terminal 101 sides, so, can be through the interim ID identified wireless terminal 101 of dynamic change.
Use this ID to carry out the communication between wireless terminal 101 and the ID management server 103, thereby have such effect, can prevent the tracking of the third party, the communication at the terminal of protection privacy is provided the terminal.
Second execution mode
Then, second execution mode of the present invention is described.Figure 10 is the schematic block diagram of structure of Verification System of the wireless terminal of this execution mode of expression.Verification System is made up of wireless terminal 1101, wireless base station 1102, authentication management server 1103, authentication management database 1104, network 1105.
Wireless terminal 1101 is connected with network 1105 via wireless base station 1102, authentication management server 1103, and can communicate with the other-end or the server (omitting diagram) that are connected on the network 1105.In addition, wireless terminal 1101 and authentication management server 1103 between carry out mutual authentication, after each other authentication is accomplished, the communication of carrying out to network 1105 via authentication management server 1103.This wireless terminal 1101 has unique Termination ID respectively, discerns each wireless terminal through this Termination ID.
Wireless terminal 1101 and authentication management server 1103 between jointly have the authentication information of hash function, wireless terminal 1101, the authentication information of authentication management server 1103 in advance.The verify data that wireless terminal 1101 will be used for authentication management server 1103 is carried out authentication sends to authentication management server 1103 via wireless base station 1102.Here, verify data comprise from wireless terminal 1101 and wireless base station 1102 between the relevant messaging parameter of radio communication the authentication that chooses with messaging parameter, with the shared authentication information (authentication information of the authentication information of wireless terminal 1101 or authentication management server 1103) of authentication management server 1103, the authenticate key that uses hash function to calculate.In addition, verify data comprises Termination ID.
Wireless base station 1102 can be connected with a plurality of wireless terminals 1101 simultaneously, and relaying is carried out in the transmitting-receiving of verify data between wireless terminal 1101 and the authentication management server 1103 and the data that are used to communicate by letter.In addition, wireless base station 1102 will from wireless terminal 1101 and wireless base station 1102 between the relevant messaging parameter of radio communication the authentication that chooses append in the verify data between wireless terminal 1101 and the authentication management server 1103 with messaging parameter and carry out relaying.Employed authentication was identical with messaging parameter when this authentication made verify data with messaging parameter (messaging parameter) with wireless terminal 1101.
Authentication management server 1103 is connected with wireless base station 1102, authentication management database 1104, network 1105.This authentication management server 1103 also can be connected with a plurality of wireless base stations 1102.
In addition, authentication management server 1103 is via the verify data of wireless base station 1102 receptions from wireless terminal 1101.
In addition, authentication management server 1103 have in advance with wireless terminal 1101 shared, hash function, the authentication information of wireless terminal 1101, the authentication information of authentication management server 1103.In addition; Authentication management server 1103 is when the verify data that receives from wireless terminal 1101; Be based on the Termination ID that is comprised in the verify data that receives, read the needed authentication information of authentication (authentication information of the authentication information of wireless terminal 1101 and authentication management server 1103) of wireless terminal 1101 as required from authentication management database 1104.
Here; The authentication information of wireless terminal 1101 not only; The authentication information of authentication management server 1103 also is according to the intrinsic value in each terminal; So authentication management server 1103 was read the authentication information of wireless terminal 1101 and the authentication information of authentication management server 1103 from authentication management database 1104 before making the network authentication key.
Authentication management server 1103 based on verify data, by the additional authentication in wireless base station 1102 with messaging parameter, and shared authentication information (authentication information of the authentication information of wireless terminal 1101 or authentication management server 1103), the hash function of wireless terminal 1101, wireless terminal 1101 is carried out authentication.
Authentication management database 1104 is connected with authentication management server 1103.In addition; Authentication management database 1104 is related with the Termination ID foundation of wireless terminal 1101, the authentication information between authentication storage management server 1103 and the wireless terminal 1101 (authentication information of the authentication information of wireless terminal 1101 and authentication management server 1103).Authentication information is pressed wireless terminal 1101 and difference is the shared information of authentication information (authentication information of the authentication information of wireless terminal 1101 and authentication management server 1103) that is had with wireless terminal 1101.
In addition, the communication between wireless terminal 1101 and the wireless base station 1102 is wireless connections, and along with moving of wireless terminal 1101, the wireless base station 1102 that wireless terminal 1101 is connected is changed.For example, the wireless base station 1102 that connects of wireless terminal 1101 changes to from the nearest wireless base station 1102 of wireless terminal 1101, or the wireless base station 1102 best with wireless terminal 1101 communications status.
In addition, authentication management server 1103 both can be an independent device with authentication management database 1104, also can be one.
One example of the processing of the mutual authentication mode that then, uses Figure 11 to explain in the execution mode of Figure 10, to realize, produce by the exchange of the authentication message between wireless terminal 1101 and the authentication management server 1103.But, in Figure 11, owing to only the authentication message between wireless terminal 1101 and the authentication management server 1103 is carried out relaying, so, to wireless base station 1102 not shown describing.
At first; As the initial condition in the explanation, wireless terminal 1101 and authentication management server 1103 have jointly in advance as the terminal authentication information f 0 (n) of the authentication information of wireless terminal 1101 and as the network authentication information g0 (n) of the authentication information of authentication management server 1103 as security information.Promptly; Wireless terminal 1101 keeps oneself terminal authentication information f 0 (n) and network authentication information g0 (n), and authentication management server 1103 keeps employed terminal authentication information f 0 of this wireless terminal (n) and network authentication information g0 (n) by each wireless terminal with Termination ID.In addition, no matter terminal authentication information f 0 (n) is that identical content information or different content informations can with network authentication information g0 (n).Wherein, be under the situation of identical content at terminal authentication information and network authentication information, need be when terminal authentication and change the computing that generates authenticate keys (terminal authentication key and network authentication key) according to these authentication informations during network authentication.For example, under the situation of Figure 11, carry out different computings with hash function G by hash function F.Its reason is; If when terminal authentication, make during with network authentication according to the computing of authentication information generation authenticate key identical; Then terminal authentication key and network authentication key become identically, can intactly send the authenticate key that is received, and can not carry out mutual authentication.
In addition, between wireless terminal 1101 and wireless base station 1102, state after having respectively because of the time that is used to communicate by letter or the position messaging parameter that change, that be used for shared communication at terminal.
In addition, here, n is the Termination ID of identified wireless terminal 1101, and G and F are hash functions, and t is a parameters for authentication.
In addition, above-mentioned f0 (n) is that Termination ID is the terminal authentication information of n, and g0 (n) is that Termination ID is the network authentication information of n.
In addition, (n is that Termination ID is n, the terminal authentication key that in wireless terminal 1101, generates based on parameters for authentication t, terminal authentication information f 0 (n), hash function F t) to the f1 that states after.
In addition, (n is that Termination ID is n, the terminal authentication key that in authentication management server 1103, generates based on parameters for authentication t, terminal authentication information f 0 (n), hash function F t) to the f2 that states after.
In addition, (n is that Termination ID is n, the network authentication key that in wireless terminal 1101, generates based on parameters for authentication t, network authentication information g0 (n), hash function G t) to the g1 that states after.And hash function G is that identical function or different functions can with hash function F.
In addition, (n is that Termination ID is n, the network authentication key that in authentication management server 1103, generates based on parameters for authentication t, network authentication information g0 (n), hash function G t) to the g2 that states after.
At first, when authentication, wireless terminal 1101 begins to carry out radio communication with wireless base station 1102.At this moment, have respectively with wireless terminal 1101 and wireless base station 1102 between the relevant shared messaging parameter of radio communication.The messaging parameter of confirming that wireless terminal 1101 is selected to be predetermined from messaging parameter is used messaging parameter as authentication.Here, with selected two messaging parameter authentication authorization and accountings with messaging parameter respectively as authentication with messaging parameter 1 and authentication with messaging parameter 2.In addition, below to utilize these two authentications to use the situation of messaging parameter to describe as example, still, also can utilize the authentication of any amount more than 1 to use messaging parameter.
Specify in the back about messaging parameter and authentication detailed content with messaging parameter.
Then, wireless terminal 1101 generates parameters for authentication t (step Sa1) with messaging parameter 1 and authentication with messaging parameter 2 according to authentication.Then, wireless terminal 1101 utilizes the computing of hash function F based on parameters for authentication t that is generated and terminal authentication information f 0 (n), and thus, (n, t) (step Sa2) send to authentication management server 1103 (step Sa3) to generate terminal authentication key f1.(n, method t) is described in detail in the back about generating parameters for authentication t and terminal authentication key f1.
(n t) carries out relaying to the 1102 couples of terminal authentication key f1 that send to authentication management server 1103 from wireless terminal 1101 in wireless base station.In relay processes; Wireless base station 1102 will be relevant with the radio communication between wireless terminal 1101 and the wireless base station 1102 two messaging parameters confirming as authentication with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2); This authentication is attached to terminal authentication key f1 (n with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2); T) in, and send to authentication management server 1103.
Here; Being used as the messaging parameter of authentication with messaging parameter between wireless terminal 1101 and the wireless base station 1102 is to send terminal authentication key f1 (n in the communication between wireless terminal 1101 and wireless base station 1102 at least; T) during, respectively shared and can reference.That is to say; As authentication with the messaging parameter of messaging parameter can be when sending the terminal authentication key between wireless terminal and wireless base station common reference be important; And may not be during sending do not change, for example, can change if be stored in advance in the memory etc.
Then, authentication management server 1103 according to the authentication that receives with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2) generation parameters for authentication t (step Sb1).Then, authentication management server 1103 utilizes hash function F to carry out computing based on the terminal authentication information f 0 (n) that the parameters for authentication t that is generated and authentication management server 1103 are kept, thereby generates terminal authentication key f2 (n, t) (step Sb2).And; Authentication management server 1103 detect the terminal authentication key f1 that receives (n, t) with the terminal authentication key f2 that is generated (n, t) whether identical; If the result who detects is identical, then authentication is that wireless terminal 1101 is legal wireless terminals of total security information.
Thus, the authentication of the wireless terminal 1101 in the authentication management server 1103 is accomplished.
In addition, likewise, authentication management server 1103 according to the authentication that receives with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2) generation parameters for authentication t (step Sc1).Then; Authentication management server 1103 utilizes hash function G to carry out computing based on parameters for authentication t that is generated and network authentication information g0 (n), thereby generates network authentication key g2 (n; T) (step Sc2), and the wireless base station under wireless terminal 1,101 1102 sends (step Sc3).
(n t) sends to wireless terminal 1101 to the network authentication key g2 that wireless base station 1102 will send from authentication management server 1103.
(n is in the time of t), according to (n, the authentication of using in the time of t) is with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2), generation parameters for authentication t (step Sd1) generating terminal authentication key f1 when wireless terminal 1101 receives network authentication key g2.Then, wireless terminal 1101 utilizes hash function G to carry out computing based on the network authentication information g0 (n) that the parameters for authentication t that is generated and wireless terminal 1101 are kept, thereby generates network authentication key g1 (n, t) (step Sd2).And wireless terminal 1101 detects the network authentication key g1 that is generated, and (n is t) with the network authentication key g2 (n that receives; T) whether identical; That detects comes to the same thing, thereby regards as the legal authentication management server that authentication management server 1103 is total security informations, and authentication is set up.
Thus, the authentication of the authentication management server 1103 in the wireless terminal 1101 is accomplished.
Then; Wireless terminal 1101 sends the information that 1101 pairs of authentication management server 1103 authentications of expression wireless terminal are accomplished to authentication management server 1103; Authentication management server 1103 receives this information, thereby the mutual authentication between wireless terminal 1101 and the authentication management server 1103 is accomplished.
In addition; In above-mentioned explanation; At first when authentication, wireless terminal 1101 and wireless base station 1102 beginning radio communications, have respectively with wireless terminal 1101 and wireless base station 1102 between the relevant shared messaging parameter of radio communication; The messaging parameter of from messaging parameter, selecting to be predetermined of confirming use messaging parameter as authentication, with selected two messaging parameters as authentication with messaging parameter 1 and authentication with messaging parameter 2.But, obtain authentication and be not limited to this with the method for messaging parameter.
For example, wireless base station 1102 will be used for reporting to wireless terminal 1101 with the messaging parameter of wireless terminal 1101 wireless connections termly.The messaging parameter that wireless terminal 1101 keeps by wireless base station 1102 reports, the messaging parameter that is kept is also passable with messaging parameter as authentication.
In addition, for example, along with moving of wireless terminal 1101, wireless terminal 1,101 1102 is obtained the messaging parameter that is used for radio communication from the wireless base station, and is also passable with messaging parameter as authentication by the messaging parameter of being obtained.
Like this, between wireless terminal 1101 and wireless base station 1102, have shared messaging parameter respectively, wireless terminal 1101 is obtained authentication according to the messaging parameter that has jointly and is used messaging parameter.In addition, for the messaging parameter that uses in wireless terminal 1101 and wireless base station 1102, in the communication between wireless terminal 1101 and wireless base station 1102, at least send terminal authentication key f1 (n, t) during, shared respectively and can reference.That is to say, as stated, can common reference between wireless terminal and wireless base station when sending the terminal authentication key as authentication with the messaging parameter of messaging parameter, this is very important, during sending, messaging parameter may not need not variation.
In addition, in the explanation of Figure 11, in wireless terminal 1101 and authentication management server 1103, in step Sc1 and step Sd1, generated parameters for authentication t with messaging parameter 1 and authentication with messaging parameter 2 respectively, still, also may not need to generate based on authentication.
For example, in wireless terminal 1101, the parameters for authentication t that in step Sa1, generates is identical with the parameters for authentication t that in step Sd1, generates, and thus, can keep the parameters for authentication t that generated by step Sa1 in advance, in step Sd2, uses the parameters for authentication t that is kept.
Equally; In authentication management server 1103, the parameters for authentication t that in step Sb1, generates is identical with the parameters for authentication t that in step Sc1, generates, thus; Can keep the parameters for authentication t that generated by step Sb1 in advance, in step Sc2, use the parameters for authentication t that is kept.
Then, explain the 1103 pairs of wireless terminals of generation authentication management server 1101 in the explanation of Figure 11 carry out the terminal authentication key f of authentication (terminal authentication) usefulness (n, t) (f1 (and n, t) or the summary of the method for f2 (n, t)).Respectively wireless terminal 1101 and authentication management server 1103 generate terminal authentication key f (n, t).
At first, wireless terminal 1101 or authentication management server 1103 obtain authentication with messaging parameter 1 and authentication with messaging parameter 2, obtain the computing of logic XOR etc., generation parameters for authentication t according to them.Then, wireless terminal 1101 or authentication management server 1103 utilize hash function F to carry out computing according to terminal authentication information f 0 (n) and parameters for authentication t, and generation terminal authentication key f (n, t).
Then, explain the network authentication key g that generates 1101 pairs of authentication management servers of wireless terminal 1103 and carry out authentication (network authentication) usefulness (n, t) (g1 (and n, t) or the method summary of g2 (n, t)).Respectively wireless terminal 1101 and authentication management server 1103 generate network authentication key g (n, t).
Wireless terminal 1101 or authentication management server 1103 according to network authentication information g0 (n) and when the terminal authentication employed parameters for authentication t, utilize hash function G to carry out computing, generate network authentication key g (n, t).
As generating employed hash function F of authenticate key or hash function G, for example can use SHA-1 (Secure Hash Algorithm-1) etc. here.
At this, (n, t) (n, in generation t), wireless terminal 1101 needs the identical parameters for authentication t of maintenance with authentication management server 1103 with network authentication key g at the terminal authentication key f of above-mentioned explanation.In this execution mode; For the power consumption that reduces radio band and radio communication and in order to make parameters for authentication t have abundant variation; Will be between the wireless terminal 1101 of the device that becomes the interval two ends of wireless connections and wireless base station 1102 the total information that is used for wireless connections (messaging parameter), use messaging parameter as generating the authentication that parameters for authentication t uses.
In this execution mode, as generate authentication that parameters for authentication t uses with messaging parameter 1 and authentication with messaging parameter 2, use is as the wireless terminal identifier (MAC (Media Access Control)-Termination ID) and the frame number of two messaging parameters.
Wireless terminal identifier (MAC-Termination ID) is meant the identifier that is used to be identified in the link of establishing between wireless terminal 1101 and the wireless base station 1102 (link); Even the also additional sometimes different MAC-Termination ID of timing of link etc. is being established at identical terminal once more.So-called frame number is the number additional to the transmitting-receiving unit of the such data of frame, the additional different number of each transceive data.
Wireless terminal identifier (MAC-Termination ID) and frame number all are time dependent messaging parameters.As time dependent messaging parameter, in addition groove number (slot number), temporal information etc. are arranged, also can be with groove number, temporal information etc. as authentication with messaging parameter 1 and authentication with messaging parameter 2.
In addition, with messaging parameter (messaging parameter), messaging parameter not only can use the value that changes with the time one as the authentication that is used to generate messaging parameter t, and can use the value that changes that moves according to the terminal.For example, also can use the identifier of wireless base station, the identifier of paging zone (pagingarea), the end packet number that the wireless base station provides service, the communication carrier number that the wireless base station provides.
In addition; As the authentication that is used to generate parameters for authentication t with messaging parameter (messaging parameter); In addition, can also use desired value, the end packet under the terminal number, the communication carrier of terminal in communication number etc. of the situation that mixes of the communication of expression wireless base station report.
The identifier of the wireless base station that here uses is to be used for the information that wireless terminal is discerned the wireless base station separately.For example, the identifier of the wireless base station of wireless base station report changes, and thus, wireless terminal detects the service of moving and transfer to different wireless base stations and provides in the scope.
In addition, the identifier of paging zone be used for wireless terminal separately the grouping of a plurality of wireless base stations of identification be the information of paging zone.For example, the identifier of the paging zone of wireless base station report changes, and thus, wireless terminal detects and moves and transfer to different paging zones.
Here, paging zone is the grouping of a plurality of adjacent wireless base stations.For example, wireless terminal is not that moving between each wireless base station just carried out Location Registration, and only carries out Location Registration during mobile between the so a plurality of wireless base stations of paging zone divide into groups, and thus, the needed number of communications of registration can dip.
It is the information of the sum of the end packet when wireless terminal is divided into a plurality of groups that the wireless base station provides the packet count at the terminal of service.For example, the wireless base station can report to the identifier of the paging zone with Different Boundary each end packet.
In addition, the communication carrier number that provides of wireless base station is the information of the communication carrier number of wireless base station and the wireless terminal transmitting-receiving that can be used in control information or data.For example, the communication carrier number that provides in the wireless base station has under a plurality of situation, selects wireless base station or the employed communication carrier of wireless terminal.
The desired value of the situation that mixes of the communication of expression wireless base station report is the information of the desired value that mixes situation of the communication of expression wireless base station.For example, when wireless terminal begins to carry out the transmitting-receiving of control information or data, be used to select communication carrier.
In addition, the end packet under the terminal number is the number of the end packet identification usefulness used when the paging zone that the wireless base station is provided by end packet is divided etc.
In addition, the communication carrier of terminal in communication number is that number is used in identification on the communication carrier that uses when appending to the transmitting-receiving of between wireless terminal and wireless base station, carrying out control information or data.
And then, as authentication with messaging parameter 1 and authentication with messaging parameter 2, can use random number and MAC-Termination ID.Figure 12 is the precedence diagram of the authentication of expression under this situation with the derivation step of messaging parameter.At first, wireless terminal 1101 generates random number (step S1101), and the random number that is generated is attached in the MAC-Termination ID request for allocation, sends to wireless base station 1102 (step S1102).Wireless base station 1102 inspections and the conflict of distributing to the MAC-Termination ID of other wireless terminals calculate the MAC-Termination ID (step S1103) that can distribute to wireless terminal 1102.Then; Wireless base station 1102 will be attached to the MAC-Termination ID assignment response from wireless terminal 1101 random number that receives and the MAC-Termination ID that is calculated; And send to wireless terminal 1101 (step S1104), with the random number of being sent and MAC-Termination ID confirm as respectively authentication with messaging parameter 1 and authentication with messaging parameter 2 (step S1105).Wireless terminal 1101 receives MAC-Termination ID assignment response, and will be attached to random number and MAC-Termination ID in this MAC-Termination ID assignment response confirm as authentication with messaging parameter 1 and authentication with messaging parameter 2 (step S1106).
In addition, processing shown in Figure 12 is based on the allocation process of MAC-Termination ID.In MAC-Termination ID allocation process, the wireless base station distributes the MAC-Termination ID to wireless terminal.In addition, be not limited to whether carry out authentication, must carry out when carrying out the communication of control information etc. one to one using between radio zone between wireless terminal and wireless base station in MAC-Termination ID allocation process.Therefore, when this allocation process, set simultaneously authentication with messaging parameter 1 and authentication with messaging parameter 2, thus, need not regenerate random number for other authentication, send to wireless terminal.
In addition, after MAC-Termination ID allocation process finished, under situation about communicating between wireless terminal and the wireless base station, the wireless base station branch was used in the groove (slot) that sends and receive, with the position of reporting channel to wireless terminal report MAC-Termination ID and groove.
In addition, in the wireless base station, also unclear sometimes from the communication timing of wireless terminal to the wireless base station.At this moment, wireless terminal utilizes the arbitrary access zone, sends the groove request for allocation by the MAC-Termination ID.Which wireless terminal can both utilize the arbitrary access zone to send, and is sending between wireless terminal under the situation that has produced conflict, and the message of transmission goes out of use.MAC-Termination ID request for allocation is also utilized this arbitrary access zone.
Like this; In this execution mode; Generate parameters for authentication t through information (messaging parameter) that is total, that be used for wireless connections between the wireless terminal 1101 of the device that becomes the interval two ends of wireless connections and wireless base station 1102, the total information that is used for wireless connections is very important because of this point that time or position have abundant variation.
In addition; Information (messaging parameter) between the wireless terminal 1101 of the device that becomes the interval two ends of wireless connections and wireless base station 1102, that be used for wireless connections is total, information (messaging parameter) that this is total as authentication with messaging parameter (for example, authentication is with messaging parameter 1 and 2); Generate parameters for authentication t; Thus, as after state, can realize the mutual authentication between wireless terminals 1101 and the wireless base station 1102 with three message.
Then, use Figure 13 and Figure 14 that wireless terminal 1101 and authentication management server 1103 are further described.
In Figure 13, wireless terminal 1101 has parameters for authentication and obtains portion 1210, parameters for authentication generation portion 1211, authentication information and obtain portion 1212, authenticate key generation portion 1213, authenticate key sending part 1203.
Parameters for authentication obtains portion 1210 and from the messaging parameter of the wireless terminal 1101 that is used for sending authentication request and the communication between the wireless base station 1102, selects and obtain authentication and use messaging parameter.The messaging parameter of selecting with messaging parameter as authentication is for example wireless terminal identifier (MAC-Termination ID) and frame number.Here, for the ease of explanation, with parameters for authentication obtain two messaging parameters that portion's 1210 selections obtain as authentication with messaging parameter 1 and authentication with messaging parameter 2.
Parameters for authentication generation portion 1211 according to parameters for authentication obtain authentication that portion 1210 obtained with messaging parameter 1 and authentication with messaging parameter 2 generation parameters for authentication t.
Authentication information is obtained portion 1212 and is obtained the authentication information (authentication information of wireless terminal 1101) that wireless terminal 1101 is had.
Parameters for authentication t that authenticate key generation portion 1213 is generated based on parameters for authentication generation portion 1211 and authentication information are obtained 1212 in portion and are obtained authentication information, utilize hash function to carry out computing, generate authenticate key.
The terminal authentication solicited message that authenticate key sending part 1203 will comprise by the Termination ID of the authenticate key of authenticate key generation portion 1213 generations and identified wireless terminal 1101 sends to authentication management server 1103.
Then, function of use block diagram 14 is explained the function of the authentication management server 1103 of a side of carrying out authentication.Authentication management server 1103 has authenticate key acceptance division 1301, parameters for authentication and obtains portion 1310, parameters for authentication generation portion 1311, authentication information and obtain portion 1312, authenticate key generation portion 1313, authenticate key and obtain portion 1302, authentication department 1303.
During carrying out, 1301 pairs of wireless base stations of authenticate key acceptance division 1102 receive terminal authentication solicited message then from wireless terminal 1101.Here; In the terminal authentication solicited message that authenticate key acceptance division 1301 receives, comprising: authenticate key that is sent by wireless terminal 1101 and Termination ID, the authentication from be attached to messaging parameter the terminal authentication solicited message, relevant with radio communication between wireless terminal 1101 and the wireless base station 1102 by wireless base station 1102, selected are with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2).
Parameters for authentication obtains portion 1310 and from the terminal authentication solicited message that authenticate key acceptance division 1301 is received, extracts authentication with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2).
Parameters for authentication generation portion 1311 obtains authentication that portion 1310 extracts with messaging parameter (authentication with messaging parameter 1 and authentication with messaging parameter 2) generation parameters for authentication t according to parameters for authentication.
Authentication information is obtained portion 1312 and is received the Termination ID of receipts based on authenticate key acceptance division 1301, obtains the authentication information (authentication information of wireless terminal 1101) that meets from authentication management database 1104.
Authenticate key generation portion 1313 obtains the authentication information that portion 1312 obtains based on parameters for authentication t and authentication information that parameters for authentication generation portion 1311 generates, utilizes hash function to carry out computing, thereby generates authenticate key.
Authenticate key is obtained portion 1302 and is extracted authenticate key according to the terminal authentication solicited message that authenticate key acceptance division 1301 receives.
Whether the authenticate key that 1303 detection authenticate key generation portions 1313 of authentication department generate is consistent with the authenticate key that authenticate key is obtained portion's 1302 extractions, thus, carries out the authentication of wireless terminal 1101.
Then, use Figure 15, with example more specifically in this execution mode, be created on that to require authentication one side be that the method for the authenticate key of wireless terminal 1101 describes.
At first, parameters for authentication obtain portion 1210 obtain frame number as authentication with messaging parameter 1, obtain wireless terminal identifier (MAC-Termination ID) as authentication with messaging parameter 2.
Then, parameters for authentication generation portion 1211 obtains authentication that portion 1210 the obtains last cover (adds padding) with the bit string (bit string) of messaging parameter 1, adjustment position long (a step S1301) in parameters for authentication.Then, parameters for authentication generation portion 1211 obtains authentication that portion 1210 the obtains front cover (step S1302) with the bit string of messaging parameter 2 in parameters for authentication.Thus, the adjustment position is long.As one of method of cover, increase whole positions and be 0 value here.As the long method in adjustment position, just like inferior method: under the long situation of length on the throne, take out part arbitrarily, perhaps, under the short situation of length on the throne, to part cover arbitrarily etc.
Then, the authentication behind the parameters for authentication generation portion 1211 calculating covers generates parameters for authentication t (step S1303) with messaging parameter 1 and the logic XOR of authentication with messaging parameter 2.
Then; Authenticate key generation portion 1213 connects authentication informations and obtains the authentication information that portion 1212 obtains and the parameters for authentication t (step S1304) of parameters for authentication generation portion 1211 generations; And, utilize SHA-1 to carry out hash computations (step S1305) as required at position cover arbitrarily.
Then, authenticate key generation portion 1203 takes out the whole of hash result or a part, generates authenticate key (step S1306).
In addition, in above-mentioned explanation, be that request authentication one side, authentication management server 1103 are to carry out authentication one side to be illustrated with wireless terminal 1101.But wireless terminal 1101 also can become request authentication one side respectively and carry out authentication one side with authentication management server 1103.Therefore, wireless terminal 1101 had both had the function of request authentication one side of Figure 13 explanation, had the function of carrying out authentication one side of Figure 14 explanation again.
In addition, use Figure 15 that the method that the wireless terminal in this execution mode 1101 generates authenticate key is illustrated, still, the method for the authentication management server 1103 generation authenticate keys also method with wireless terminal 1101 generation authenticate keys is the same.
That is to say; In the explanation of above-mentioned request authentication one side and the function of carrying out authentication one side; The parameters for authentication generation portion 1211 of Figure 13 and parameters for authentication generation portion 1311, the authenticate key generation portion 1213 of Figure 13 and the authenticate key generation portion 1313 of Figure 14 of Figure 14 have identical functions respectively, and be identical with the method that authentication information generates authenticate key based on parameters for authentication t.
But, authentication with the adquisitiones of messaging parameter and authentication information in parameters for authentication obtains portion 1210 and authenticate key acceptance division 1301, obtain portion 1212 at authentication information and obtain in the portion 1312 different respectively with authentication information.Promptly; Parameters for authentication obtains in the messaging parameter the communication of portion 1210 between wireless terminal 1101 and wireless base station 1102 to be selected and obtains authentication and use messaging parameter; With respect to this, parameters for authentication obtains portion 1310 and from the terminal authentication solicited message that authenticate key acceptance division 1301 receives, extracts authentication and use messaging parameter.In addition; Authentication information is obtained portion 1212 and is obtained the authentication information that wireless terminal 1101 has; With respect to this, authentication information is obtained Termination ID that portion 1312 receives based on authenticate key acceptance division 1301 is obtained the wireless terminal 1101 that meets from authentication management database 1104 authentication information.
Then, the precedence diagram of use Figure 16 is explained the flow process of the processing of the Verification System integral body in this execution mode.
At first, wireless terminal 1101 beginnings and wireless base station 1102 carry out radio communication.Then; The information (messaging parameter) of the connection that be used for radio communication of wireless terminal 1101 between wireless terminal 1101 and wireless base station 1102 obtain authentication with messaging parameter 1 and authentication with messaging parameter 2; Obtain the computing of logic XOR etc., generate parameters for authentication t.Then, wireless terminal 1101 utilizes hash function F to carry out computing according to parameters for authentication t and terminal authentication information f 0 (n), generates terminal authentication key f1 (n, t) (step S1401).Then, wireless terminal 1101 will become self Termination ID and the terminal authentication key f1 of identifier (n t) as the terminal authentication request message, will send to wireless base station 1102 (step S1402).
Then; The information that is used for wireless connections of wireless base station 1102 between wireless terminal 1101 and wireless base station 1102 obtain authentication with messaging parameter 1 and authentication with messaging parameter 2; And append to from the terminal authentication request message of wireless terminal 1101 (step S1403), send to authentication management server 1103 (step S1404).
Then, the Termination ID that authentication management server 1103 uses the terminal authentication request message that receives to be comprised is obtained wireless terminal 1101 intrinsic terminal authentication information f 0 (n) and network authentication information g0 (0) from authentication management database 1104.Then, the authentication that authentication management server 1103 is comprised according to the terminal authentication solicited message that receives with messaging parameter 2, obtains the computing of logic XOR etc., generation parameters for authentication t with messaging parameter 1 and authentication.Then, authentication management server 1103 utilizes hash function F to carry out computing according to parameters for authentication t that is generated and the terminal authentication information f 0 (n) that is obtained, and generation terminal authentication key f2 (n, t).Authentication management server 1103 detects the terminal authentication key f1 (n that receives; T) and the terminal authentication key f2 (n that generates of the terminal authentication information f 0 (n) that keeps according to authentication management server 1103 and parameters for authentication t; T) whether identical; Testing result is identical, thereby authenticate wireless terminal 1101 is the legal wireless terminals that have identical terminal authentication information f 0 (n).
For authentication management server 1103, (n, t) (n, under the situation inequality of testing result t), wireless terminal 1101 is not legal wireless terminal, authentification failure with the terminal authentication key f2 that generates at the terminal authentication key f1 that receives.Authentication management server 1103 does not carry out later authentication processing in the moment of having distinguished authentification failure, sends error message etc. to wireless terminal 1101 as required.Under the situation of authentification failure, wireless terminal 1101 can not begin and the communicating by letter of network 1105.
Then; Authentication management server 1103 is under the situation of legal wireless terminal at authenticate wireless terminal 1101; According to generate terminal authentication key f2 (n, parameters for authentication t that uses in the time of t) and the network authentication information g0 (n) that obtains utilize hash function G to carry out computing; Generate network authentication key g2 (n, t) (step S1405).Authentication management server 1103 with network authentication key g2 (n, t) with the Termination ID of identifier that becomes wireless terminal 1101 as the terminal authentication response message, send to wireless base station 1102 (step S1406).
Then, wireless base station 1102 will send to wireless terminal 1101 (step S1407) from the terminal authentication response message that authentication management server 1103 receives.
The network authentication information g0 (n) relevant that wireless terminal 1101 keeps according to wireless terminal 1101 in advance and generate terminal authentication key f1 (n with authentication management server 1103; T) the parameters for authentication t that uses the time; Utilize hash function G to carry out computing, and generation network authentication key g1 (n, t).Then; Wireless terminal 1101 detects the network authentication key g2 (n that receives; T) and the network authentication key g1 (n that generates; T) whether identical, come to the same thing owing to what detect, thereby authentication authentication management server 1103 is the legal authentication management servers that have identical network authentication information g0 (n).
(n, t) (n, when testing result t) was inequality, wireless terminal 1101 was regarded as " management server 1103 is not legal authentication management server ", authentification failure with the network authentication key g1 that generates at the network authentication key g2 that is received.Wireless terminal 1101 does not carry out later authentication processing in the moment of having distinguished authentification failure, sends error message etc. to authentication management server 1103 as required.Under the situation of authentification failure, wireless terminal 1101 can not begin communicate by letter (the step S1408) with network 1105.
Then; Wireless terminal 1101 is under the situation of legal authentication management server at authentication authentication management server 1103; Pass to authentication management server 1103 for mutual authentication is accomplished, the terminal authentication completion message that will contain the Termination ID of the identifier that becomes self sends to wireless base station 1102 (step S1409).
Then, wireless base station 1102 will be accomplished message from the terminal authentication of wireless terminal 1101 and send to authentication management server 1103 (step S1410).
Authentication management server 1103 is accomplished the mutual authentication that the reception of message detects between wireless terminal 1101 and the authentication management server 1103 through terminal authentication and is accomplished.Because the completion of authentication each other, wireless terminal 1101 can communicate via authentication management server 1103 and network 1105.
As stated, can carry out recognizing each other mutually between wireless terminal 1101 and the authentication management server 1103 with three times the message altogether between wireless terminal 1101 in step S1402,1404, step S1406,1407, step S1409,1410 and the authentication management server 1103 levies.
Above-mentioned example is to ask the situation of beginning authentications to be illustrated with 1101 pairs of authentication management servers of wireless terminal 1103, and still, by the 1101 request beginning authentications of 1103 pairs of wireless terminals of authentication management server the time, the step of authentication is opposite.Promptly; Based on the request of authentication management server 1103, with earlier in wireless terminal 1101 comparing cell authenticate key g (n, t), comparison terminal authenticate key f (n in the authentication management server 1103 after receiving this response; T) such step is accomplished mutual authentication.
Use the precedence diagram of Figure 17 that the whole flow process of Verification System of this moment is described.For example, when the other-end that is connected with network 1105 sent data with wireless terminal 1101 as the transmission destination, the data that other-end will have been given the Termination ID of wireless terminal 1101 sent to authentication management server 1103.Authentication management server 1103 uses the Termination ID that receives, and obtains wireless terminal 1101 intrinsic terminal authentication information f 0 (n) and network authentication information g0 (n) from authentication management database 1104.
Then, authentication management server 1103 appends to Termination ID that receives and network authentication information g0 (n) in the terminal authentication request message, sends to wireless base station 1102 (step S1501).Here, owing to authentication is only known by wireless terminal 1101 and wireless base station 1102 with messaging parameter 2 with messaging parameter 1 and authentication, so the network authentication key is not by authentication management server 1103 but is generated by wireless base station 1102.Therefore, from authentication management server 1103 network authentication information g0 (n) is notified to wireless base station 1102.
Wireless base station 1102 obtain among the messaging parameter between wireless terminal 1101 and the wireless base station 1102 authentication with messaging parameter 1 and authentication with messaging parameter 2, and obtain the computing of logic XOR etc., generation parameters for authentication t.Then, wireless base station 1102 is according to the parameters for authentication t that is generated and be attached to the network authentication information g0 (n) in the terminal authentication request message that receives, and utilizes hash function G to carry out computing, generates network authentication key g2 (n, t) (step S1502).Then, (n t) is attached in the terminal authentication request message with Termination ID, and sends (step S1503) to wireless terminal 1101 with network authentication key g2 in wireless base station 1102.
Obtain the messaging parameter of wireless terminal 1101 between wireless terminal 1101 and wireless base station 1102 authentication with messaging parameter 1 and authentication with messaging parameter 2, obtain the computing of logic XOR etc., generation parameters for authentication t.Then, the network authentication information g0 (n) relevant with authentication management server 1103 that wireless terminal 1101 keeps with self according to parameters for authentication t in advance utilizes hash function G to carry out computing, generate network authentication key g1 (n, t).Then; Wireless terminal 1101 detects the network authentication key g2 (n that receives; T) and the network authentication key g1 (n that is generated; T) whether identical, the coming to the same thing of detection, thus authentication authentication management server 1103 is legal authentication management servers (step S1504) of total identical network authentication information g0 (n).
On the other hand; The network authentication key g2 that receives (n, t) (n is under the situation inequality of testing result t) with the network authentication key g1 that generates; Wireless terminal 1101 is regarded as " authentication management server 1103 is not legal authentication management server ", authentification failure.Wireless terminal 1101 does not carry out its later processing when having distinguished authentification failure, and sends error message etc. to authentication management server 1103 as required.Under the situation of authentification failure, wireless terminal 1101 can not begin and the communicating by letter of network 1105.
Then; At authentication authentication management server 1103 is under the situation of legal authentication management server; Wireless terminal 1101 according to generate network authentication key g1 (n, parameters for authentication t that uses in the time of t) and the terminal authentication information f 0 (n) that self keeps utilize hash function F to carry out computing; Generate terminal authentication key f1 (n, t) (step S 1505).Then, (n t) is attached in the terminal authentication response message wireless terminal 1101, and sends (step S1506) to wireless base station 1102 with self Termination ID and terminal authentication key f1.
The authentication that wireless base station 1102 will before have been obtained is attached to from the terminal authentication response message of wireless terminal 1101 (step S1507) with messaging parameter 2 (step S1502) with messaging parameter 1 and authentication, and sends (step S1508) to authentication management server 1103.
Authentication management server 1103 according to be attached to authentication in the terminal authentication response message that receives with messaging parameter 1 and authentication with messaging parameter 2, obtain the computing of logic XOR etc., generation parameters for authentication t.Then, authentication management server 1103 utilizes hash function F to carry out computing according to parameters for authentication t that is generated and the terminal authentication information f 0 (n) that formerly obtains, generates terminal authentication key f2 (n, t) (step S1509).
Then, (n is t) with the terminal authentication key f2 (n that generates for the terminal authentication key f1 that 1103 detections of authentication management server receive; T) whether identical; Testing result is identical, and thus, authenticate wireless terminal 1101 is the legal wireless terminals that have identical terminal authentication information f 0 (n).On the other hand, (n, t) (n, under the situation inequality of testing result t), wireless terminal 1101 is not legal wireless terminal, authentification failure with the terminal authentication key f2 that generates at the terminal authentication key f1 that receives.Authentication management server 1103 does not carry out its later authentication processing when having distinguished authentification failure, send error message etc. to wireless terminal 1101 as required.Under the situation of authentification failure, wireless terminal 1101 can not begin communicate by letter (the step S1510) with network 1105.
On the other hand; At authenticate wireless terminal 1101 is under the situation of legal wireless terminal; Authentication management server 1103 is accomplished message with the terminal authentication that has added Termination ID and is sent to wireless base station 1102 (step S1511) in order to transmit the completion of mutual authentication to wireless terminal 1101.The terminal authentication completion message that wireless base station 1102 is accepted as unavoidable license management server 1103 in the future sends to wireless terminal 1101 (step S1512).
Wireless terminal 1101 is according to the reception of terminal authentication completion message, and the mutual authentication that detects between wireless terminal 1101 and the authentication management server 1103 is accomplished.Because of the completion of this mutual authentication, terminal 1101 can be carried out and the communicating by letter of network 1105 via authentication management server 1103.
As stated, can carry out the mutual authentication between wireless terminal 1101 and the authentication management server 1103 with three times the information exchange altogether between wireless terminal 1101 in step S1501,1503, step S1506,1508, step S1511,1512 and the authentication management server 1103.
That kind as described above; When the terminal authentication of authentication management server authentication wireless terminal; In wireless terminal, from position one messaging parameter shared that change of time or wireless terminal (wireless terminal identifier (MAC-Termination ID), frame number, groove number, temporal information etc.) with the wireless base station, select and obtain predetermined messaging parameter to use messaging parameter as authentication; Use messaging parameter according to the selected authentication that obtains, generate and send the terminal authentication key.In the wireless base station, with the terminal authentication key during to authentication management server relaying, the additional above-mentioned selected messaging parameter of obtaining, authentication authorization and accounting are used messaging parameter, send to the authentication management server.The authentication management server use messaging parameter based on the authentication that receives, computing terminal authenticate key alone, and as if identical with terminal authentication key from wireless terminal, authenticate wireless terminal then.
In addition; With the method same with terminal authentication, the authentication management server sends to wireless terminal with the network authentication key, thus; Realize the network authentication that wireless terminal carries out authentication to the authentication management server, send to the authentication management server from wireless terminal at last and accomplish notice.As stated, the mutual authentication between wireless terminal and the authentication management server can realize through amounting to 3 message.
Messaging parameter report, that perhaps when the communication beginning, between wireless base station and wireless terminal, have from the wireless base station; Change with mobile one of time or terminal; And then; Because can have identical value in the wireless base station with wireless terminal, so, the replacement of the value of the each variation in can responding as request &.
In addition; Report from the wireless base station, or be necessary at messaging parameter total between wireless base station and the wireless terminal in order to establish communication path between wireless terminal and the wireless base station in when beginning communication; And be known; So, in that messaging parameter is used as under the situation of authentication with messaging parameter, new cost can not take place.
Through the authentication method of this above execution mode, as cheap small-sized mobile radio terminal such as transducer, the data volume that communicates is few, even in confined radio band under the situation at a plurality of terminals of authentication, and also authentication each other.
In addition; In the authentication method of this execution mode, owing to do not need the computing function of the complicacy of public key encryption mode, random number generation, clock etc., so; Even under the small-sized and cheap situation of wireless terminal, also can adopt the authentication method of this execution mode.
In addition, in the authentication method of this execution mode, because computational throughput and radio communication amount are few, so wireless terminal can be driven by battery for a long time.
In addition, in the authentication method of this execution mode, because radio communication step and radio communication amount are few, so, can effectively utilize radio band, and a plurality of terminal can be carried out authentication simultaneously.
In addition, this execution mode not only is used for the mutual authentication of terminal and authentication management server, only the terminal authentication in the authentication management server, only also effective in the network authentication in the terminal.
For example; Send terminal authentication key f (n from the wireless terminal 1101 of Figure 11 to authentication management server 1103; T), have only authentication management server 1103 authentication terminal authentication key f (n, t) thus; Authentication in the authentication management server 1103 of wireless terminal 1101 is accomplished, and also can only use this terminal authentication.
In addition; On the contrary, from authentication management server 1103 to wireless terminal 1101 send network authentication key g (n, t); Have only wireless terminal 1101 authenticating network authenticate key g (n; T), thus the authentication in the wireless terminal 1101 of authentication management server 1103 accomplish, also can only use this network authentication.
In addition, in the explanation of this execution mode,, use messaging parameter, from messaging parameter, select authentication to describe with the frame number of messaging parameter 1 and authentication wireless terminal identifier (MAC-Termination ID) with messaging parameter 1 as authentication in order to generate parameters for authentication t.But; The method of generation parameters for authentication t in this execution mode is not limited thereto; Can the communication carrier that communicate as the desired value of the situation that mixes of the expression communication of the identifier of identifier messaging parameter, terminal recognition symbol (MAC-Termination ID), frame number, groove number, temporal information, wireless base station, paging zone, end packet number that the wireless base station provides service, communication carrier number that the wireless base station provides, wireless base station report, end packet number or terminal under the terminal number, random number and their combination selection arbitrarily use messaging parameter as authentication, also can with messaging parameter generation authentication communication parametric t based on the authentication of selecting.
More than, with reference to accompanying drawing execution mode of the present invention has been described at length, still, concrete structure is not limited to these execution modes, also comprises the design etc. in the scope that does not break away from aim of the present invention.For example, also can the first and second above-mentioned execution modes of appropriate combination.Below, an example that makes up is like this described as the 3rd execution mode.
The 3rd execution mode
Figure 18 is the block diagram of structure of the system of this execution mode of expression.Wireless terminal 2001 has the function of wireless terminal 1101 of function and second execution mode of the wireless terminal 101 of first execution mode.Wireless base station 2002 has the function of wireless base station 1102 of function and second execution mode of the wireless base station 105 of first execution mode.ID& authentication management server 2003 has the function of authentication management server 1103 of function and second execution mode of the ID management server 103 of first execution mode.ID management database 2004, authentication management database 2005, terminal 2006 have the function same with the terminal of the authentication management database 1104 of the ID management DB 104 of first execution mode, second execution mode, first execution mode 102.In addition, network 2007 and 2008 is networks identical with the network of the network 106 of first execution mode and 107 or second execution mode 1105.
Figure 19 is the precedence diagram of the flow process of the processing of entire system when being illustrated in the 2003 request beginning authentications of 2001 pairs of ID& authentication managements of wireless terminal server.Because each action is identical with the action of the action of first execution mode and second execution mode basically, so, only mention main aspect, omit detailed content, and be that the center describes with the handling process of integral body.
At first, wireless terminal 2001 generates terminal authentication keys (step S2001), self interim ID and terminal authentication key is attached in the terminal authentication request message, and sends to wireless base station 2002 (step S2002).The MAC-Termination ID (therefore, being assigned the wireless terminal 2001 of this MAC Termination ID) of the position that is assigned to this groove can be familiar with based on the position of the groove that has sent wireless terminal requirement message in wireless base station 2002.Wireless base station 2002 interim ID of storage and MAC-Termination ID; And; Obtain authentication with messaging parameter 1 and authentication with messaging parameter 2, be attached in the terminal authentication request message from wireless terminal 2001, and send to ID& authentication management server 2003 (step S2003).The interim ID that ID& authentication management server 2003 will be attached in the terminal authentication request message that receives is attached in the Termination ID retrieval request message (the fixedly ID retrieval request that is equivalent to Fig. 5), and sends to ID management database 2004 (step S2004).Fixedly ID retrieval of ID management DB 2004; Obtain fixedly ID according to interim ID; Resulting fixedly ID is attached in the Termination ID retrieval response message (being equivalent to the fixedly ID retrieval response of Fig. 5), and sends to ID& authentication management server 2003 (step S2005).
ID& authentication management server 2003 appends to the fixedly ID that is sent in the authentication information request message, and sends to authentication management database 2005 (step S2006).Authentication management database 2005 is obtained terminal authentication information and NW authentication information, they is attached in the authentication information retrieval response message, and sends to ID& authentication management server 2003 (step S2007).ID& authentication management server 2003 will add fixedly, and next interim ID retrieval request message (retrieval request that is equivalent to Fig. 4) of ID sends to ID management DB 2004 (step 2008).The interim ID of the interim ID non-contravention of 2004 generations of ID management DB and other-end is as next interim ID; And hash number of times that will be corresponding therewith is as interim ID hash number of times; Be attached in next interim ID retrieval response message (being equivalent to step S507~S509 of Fig. 5 etc.), send to ID& authentication management server 2003 (step S2009).
ID& authentication management server 2003 use the authentication that self keeps with messaging parameter 1 and authentication with messaging parameter 2 and be attached to authentication information and retrieve the terminal authentication information in the response message; Generate terminal authentication key (step S2010), and carry out the contrast (step S2011) of terminal authentication key that is generated and the terminal authentication key that in the terminal authentication request message, is added.Then; ID& authentication management server 2003 use authentications with messaging parameter 1, authentication with messaging parameter 2, NW authentication information; Generate NW authenticate key (step S2012), with added interim ID, fixedly ID, NW authenticate key, the terminal authentication response message of ID hash number of times sends to wireless base station 2002 (step S2013) temporarily.
Wireless base station 2002 is based on the interim ID and fixedly ID, interim ID and the MAC-Termination ID from wireless terminal 2001 receiving terminal authentication request message the time, stored that are attached in the terminal authentication response message, can be familiar with the fixedly corresponding relation of ID and MAC-Termination ID.And afterwards when receiving message (for example, terminal authentication accomplish message), wireless base station 2002 can be with the MAC-Termination ID to fixedly ID conversion according to the fixing above-mentioned corresponding relation between ID and the MAC-Termination ID.Inferior because of the situation of wireless base stations change under mobile this wireless terminal 2001 of wireless terminal 2001, send MAC-Termination ID release message, the MAC-Termination ID is released; But, during before this, between radio zone, can utilize MAC-Termination ID identified wireless terminal 2001; In addition, in wired interval, owing to can utilize fixedly ID identified wireless terminal 2001; So, not be used in network side and carry out interim ID and the fixedly conversion of ID, just can carry out giving and accepting of message.
Then, the wireless base station 2002 terminal authentication response message that will add NW authenticate key and interim ID hash number of times sends to wireless terminal 2001 (S2014).Wireless terminal 2001 use the authentication that self keeps with messaging parameter 1, authentication with messaging parameter 2, NW authentication information; Generate NW authenticate key (step S2015), and NW authenticate key that is generated and the NW authenticate key that is attached in the terminal authentication response message are contrasted (step S2016).Utilize and should contrast, under the situation of NW authentication success, wireless terminal 2001 is accomplished message with terminal authentication and is sent to ID& authentication management server 2003 (step S2017, S2018) via wireless base station 2002.In addition, wireless terminal 2001 uses the interim ID hash number of times that is attached in the terminal authentication response message to upgrade interim ID (step S2019).
Then, Figure 20 is the precedence diagram of the flow process of the processing of entire system when being illustrated in the 2001 request beginning authentications of 2003 pairs of wireless terminals of ID& authentication management server.
At first; ID& authentication management server 2003 with wireless terminal 2001 as sending the destination; In response to data sending request from (not shown) such as terminals of appointment; Interim ID retrieval request message (being equivalent to the interim ID retrieval of Fig. 7) with the fixedly ID that has added the wireless terminal 2001 that is added in this data sending request sends to ID management DB 2004 (step S2101).The ID management DB 2004 retrievals interim ID corresponding with the fixedly ID that receives sends to ID& authentication management server 2003 (step S2102) with the interim ID retrieval response message that has added resulting interim ID (being equivalent to the interim ID retrieval response of Fig. 7).
ID& authentication management server 2003 is attached to the fixedly ID that is sent in the authentication information request message, and sends to authentication management database 2005 (step S2103).Terminal authentication information that authentication management database 2005 is obtained with fixedly ID is corresponding and NW authentication information, and they are attached in the authentication information retrieval response message, send to ID& authentication management server 2003 (step S2104).ID& authentication management server 2003 will add fixedly, and next interim ID retrieval request message of ID sends to ID management DB 2004 (step S2105).The interim ID of the interim ID non-contravention of 2004 generations of ID management DB and other-end; As next interim ID; And incite somebody to action corresponding therewith hash number of times as ID hash number of times, and be attached in next interim ID retrieval response message, send to ID& authentication management server 2003 (step S2016).ID& authentication management server 2003 will add interim ID, fixedly the terminal authentication request message of ID, NW authentication information, interim ID hash number of times sends to wireless base station 2002 (step S2107).
Wireless base station 2002 use the authentication that self keeps with messaging parameter 1, authentication with messaging parameter 2 and the NW authentication information that receives; Generate NW authenticate key (step S2108), the terminal authentication request message that has added the NW authenticate key that is generated, interim ID and interim ID hash number of times is sent to wireless terminal 2001 (step S2109).In addition, in this case, because knowing, wireless base station 2002 can not send the terminal authentication request message, so the operation report channel sends the terminal authentication request message to all wireless terminals to the wireless terminal of which MAC-Termination ID.In addition, use messaging parameter as authentication, because the random number can not utilize MAC-Termination ID or MAC-Termination ID allocation process the time, so, the messaging parameter beyond their used.But; Utilizing reporting channel to call out wireless terminal from the wireless base station with message related to calls; And after having distributed the MAC-Termination ID, the terminal authentication request message is sent under the situation of wireless terminal, can utilize MAC-Termination ID or MAC-Termination ID to divide the random number of timing.
Acceptance is from the terminal authentication request message of wireless base station 2002; Wireless terminal 2001 use the authentication that self keeps with messaging parameter 1, authentication with messaging parameter 2, NW authentication information; Generate NW authenticate key (step S2110); And, carry out the contrast (step S2111) of NW authenticate key that is generated and the NW authenticate key that in the terminal authentication request message, is added.Then; Wireless terminal 2001 uses above-mentioned authentication with messaging parameter 1 and the authentication terminal authentication information with messaging parameter 2 and self maintenance; Generate terminal authentication key (step S2112); And self interim ID is attached in the terminal authentication response message with the terminal authentication key that generated, send to wireless base station 2002 (step S2113).The interim ID that wireless base station 2002 will be added in the terminal authentication response message is transformed to fixedly ID, and the authentication that has added fixing ID, terminal authentication key, self kept is sent to ID& authentication management server 2003 (step S2114) with messaging parameter 1 and authentication with the terminal authentication response message of messaging parameter 2.
ID& authentication management server 2003 use the authentication that receives with messaging parameter 1 and authentication with messaging parameter 2 and the terminal authentication information that before obtained; Generate terminal authentication key (step S2115), carry out terminal authentication key that is generated and the contrast (step S2116) that is attached to the terminal authentication key in the terminal authentication response message that receives.Through this contrast, under the terminal authentication case of successful, ID& authentication management server 2003 is accomplished message with terminal authentication and is sent to wireless terminal 2001 (step S2117, S2118) via wireless base station 2002.Accept this terminal authentication and accomplish message, wireless terminal 2001 uses and is attached to the interim ID hash number of times in the terminal authentication request message, upgrades interim ID (step S2119).
Then, Figure 21 is the precedence diagram of expression about the flow process of the processing of interim ID initialization process entire system.The flow process of entire system is identical with Figure 19 basically; But following aspect is different: the interim ID retrieval of next among the step S2008 of replacement Figure 19 requires message, sends to ID management DB 2004 (the step S2008a of Figure 21) with next interim ID retrieval request message from ID& authentication management server 2003 with having added the fixedly initialization of ID; The interim ID retrieval of among the step S2009 of replacement Figure 19 next response message sends to ID& authentication management server 2003 (the step S2009a of Figure 21) with next interim ID retrieval response message from ID management DB 2004 with the initialization that has added interim ID hash number of times and interim ID initialization vector; To the further additional interim ID initialization vector (the step S2013a of Figure 21) of terminal authentication response message that sends to wireless base station 2002 from ID& authentication management server 2003; To the 2002 terminal authentication response messages to wireless base station 2001 transmissions further add interim ID initialization vector IV (the step S2014a of Figure 21) from the wireless base station; And carry out and the processing relevant (the special-purpose ID this point temporarily that wireless terminal 2001 specifies interim ID initialization to use with interim ID initialization with reference to Fig. 8 and Fig. 9 explanation; ID& authentication management server 2003 generates interim ID initialization vector, calculates initialized hash kind, interim ID, interim ID hash number of times this point; Interim ID hash number of times and interim ID initialization vector are sent to wireless terminal 2001 from ID& authentication management server 2003, in wireless terminal 2001, also carry out initialization process etc.).
In addition, the wireless terminal in above-mentioned each execution mode, wireless base station, ID management server, authentication management server, the ID& authentication management server mode that can have computer system with the inside at them constitutes.In this case; Also can with the course of action of the each several part of these wireless terminals, wireless base station, ID management server, authentication management server, ID& authentication management server with the stored in form of program in the recording medium of embodied on computer readable; This program is read and carried out to computer system; Thus, realize each above-mentioned processing.
Said here computer system comprises the hardware or the OS (Operating System) of CPU (Central Processing Unit), various memory, ancillary equipment etc.In addition, if utilize the situation of WWW (World Wide Web) system, then computer system comprises that also homepage provides environment or display environment.
In addition, " recording medium of embodied on computer readable " is meant writeable nonvolatile memory, CD (Compact Disc)-removable mediums such as ROM such as floppy disk, magneto optical disk, ROM, flash memory, is built in the storage devices such as hard disk in the computer system.In addition; " recording medium of embodied on computer readable " comprises the device of maintenance program set time the volatile memory (for example DRAM (Dynami Random Access Memory)) of inside computer system of server or client when becoming via communication line routers such as networks such as internet or telephone lines.
In addition, said procedure from the computer system of this procedure stores storage device etc. via transmission medium or to utilize transmission ripple in the transmission medium to send to other computer system also passable.Said here " transmission medium " is meant the medium that as communication lines such as networks such as internet or telephone line, has the function of transmission information.In addition; Said procedure also can be the program that is used to realize the part of above-mentioned functions; And, also can be the program that can realize above-mentioned functions, be difference program (differential program) through combination with the program that is recorded in computer system.
The present invention is suitable for requiring to protect the wireless terminal of privacy.In addition, the present invention also is applicable to the authentication method between wireless terminal and the server.

Claims (11)

1. the authentication method of server and communication between terminals is characterized in that,
Said server and said terminal keep shared hash function and authentication information respectively,
Temporary transient shared messaging parameter was used messaging parameter as authentication when communication was obtained between said server and said terminal at said server and said terminal respectively,
Messaging parameter is used based on said authentication information and said authentication in said server and said terminal, uses said hash function to generate authenticate key respectively,
At least one side at said server or said terminal uses the authenticate key of said generation to carry out the authentication between said server and the said terminal,
Temporary transient shared said messaging parameter is that said terminal connects needed messaging parameter to the wireless base station when said communication; And be following messaging parameter: no matter whether carry out authentication, the messaging parameter that sets in the MAC-Termination ID allocation process that must carry out under the situation about between said terminal and said wireless base station, communicating.
2. authentication method as claimed in claim 1 is characterized in that,
Said server and said communication between terminals are carried out via said wireless base station, and, use radio communication to carry out between said terminal and the said wireless base station,
Temporary transient shared wireless communication parameters when said messaging parameter is the radio communication between said terminal and said wireless base station.
3. authentication method as claimed in claim 2 is characterized in that,
Said terminal and said server keep shared the 1st hash function and the 1st authentication information respectively,
Said terminal based on said authentication with messaging parameter and said the 1st authentication information; Use said the 1st hash function; Generation is as the 1st terminal authentication key of said authenticate key, via said wireless base station the 1st terminal authentication key of said generation sent to said server
Said wireless base station appends to the said wireless communication parameters between said terminal and the said wireless base station in said the 1st terminal authentication key from said terminal with messaging parameter as said authentication, sends to said server,
Said server receives the additional said authentication in said the 1st terminal authentication key and said wireless base station and uses messaging parameter from said wireless base station; Based on the said authentication that receives with messaging parameter and said the 1st authentication information; Use said the 1st hash function, generate the 2nd terminal authentication key as said authenticate key, whether the 2nd terminal authentication key that detects said the 1st terminal authentication key that receives and said generation is identical; Thus, authentication is carried out at said terminal.
4. the authentication method of server and communication between terminals is characterized in that,
Said server and said terminal keep shared hash function and authentication information respectively,
Temporary transient shared messaging parameter was used messaging parameter as authentication when communication was obtained between said server and said terminal at said server and said terminal respectively,
Messaging parameter is used based on said authentication information and said authentication in said server and said terminal, uses said hash function to generate authenticate key respectively,
At least one side at said server or said terminal uses the authenticate key of said generation to carry out the authentication between said server and the said terminal,
Said server and said communication between terminals are carried out via the wireless base station, and, use radio communication to carry out between said terminal and the said wireless base station,
Temporary transient shared wireless communication parameters when said messaging parameter is the radio communication between said terminal and said wireless base station,
Said terminal and said server keep shared the 1st hash function and the 1st authentication information respectively,
Said terminal based on said authentication with messaging parameter and said the 1st authentication information; Use said the 1st hash function; Generation is as the 1st terminal authentication key of said authenticate key, via said wireless base station the 1st terminal authentication key of said generation sent to said server
Said wireless base station appends to the said wireless communication parameters between said terminal and the said wireless base station in said the 1st terminal authentication key from said terminal with messaging parameter as said authentication, sends to said server,
Said server receives the additional said authentication in said the 1st terminal authentication key and said wireless base station and uses messaging parameter from said wireless base station; With messaging parameter and said the 1st authentication information, use said the 1st hash function based on the said authentication that receives, generate the 2nd terminal authentication key as said authenticate key; Whether the 2nd terminal authentication key that detects said the 1st terminal authentication key that receives and said generation is identical; Thus, authentication is carried out at said terminal
Said terminal and said server keep shared the 2nd hash function and the 2nd authentication information respectively,
Said server further based on the said authentication that receives with messaging parameter and said the 2nd authentication information; Use said the 2nd hash function; Generation is as the 1st network authentication key of said authenticate key; Via said wireless base station the 1st network authentication key of said generation is sent to said terminal
Said terminal further receives said the 1st network authentication key via said wireless base station from said server; The said authentication of using when generating said the 1st terminal authentication key is with messaging parameter and said the 2nd authentication information; Use said the 2nd hash function, generate the 2nd network authentication key as said authenticate key, whether the 2nd network authentication key that detects said the 1st network authentication key that receives and said generation is identical; Thus, said server is carried out authentication.
5. the authentication method of server and communication between terminals is characterized in that,
Said server and said terminal keep shared hash function and authentication information respectively,
Temporary transient shared messaging parameter was used messaging parameter as authentication when communication was obtained between said server and said terminal at said server and said terminal respectively,
Messaging parameter is used based on said authentication information and said authentication in said server and said terminal, uses said hash function to generate authenticate key respectively,
At least one side at said server or said terminal uses the authenticate key of said generation to carry out the authentication between said server and the said terminal,
Said server and said communication between terminals are carried out via the wireless base station, and, use radio communication to carry out between said terminal and the said wireless base station,
Temporary transient shared wireless communication parameters when said messaging parameter is the radio communication between said terminal and said wireless base station,
Said terminal and said server keep shared the 1st hash function and the 1st authentication information respectively,
Said server further sends to said wireless base station with said the 1st authentication information,
Said wireless base station further based on said authentication with messaging parameter and said the 1st authentication information that receives from said server; Use said the 1st hash function; Generation is as the 1st network authentication key of said authenticate key; Said the 1st network authentication key that is generated is sent to said terminal
Said terminal further receives said the 1st network authentication key from said wireless base station; Based on said authentication with messaging parameter and said the 1st authentication information; Whether use said the 1st hash function, generate the 2nd network authentication key as said authenticate key, it is identical with said the 2nd network authentication key that is generated to detect received said the 1st network authentication key; Thus, said server is carried out authentication.
6. authentication method as claimed in claim 5 is characterized in that,
Said terminal and said server keep shared the 2nd hash function and the 2nd authentication information respectively,
Messaging parameter is used based on said the 2nd authentication information and the said authentication when generating said the 2nd network authentication key, used in said terminal; Use said the 2nd hash function; Generation is as the 1st terminal authentication key of said authenticate key; Said the 1st terminal authentication key that generates is sent to said wireless base station
Said wireless base station appends to the said wireless communication parameters between said terminal and the said wireless base station in said the 1st terminal authentication key from said terminal with messaging parameter as said authentication, sends to said server,
Said server receives said the 1st terminal authentication key and said authentication and uses messaging parameter from said wireless base station; Based on received said authentication with messaging parameter and said the 2nd authentication information; Whether use said the 2nd hash function, generate the 2nd terminal authentication key as said authenticate key, it is identical with said the 2nd terminal authentication key that is generated to detect said the 1st terminal authentication key that receives; Thus, authentication is carried out at said terminal.
7. like any described authentication method of claim 2 to 6, it is characterized in that,
Said wireless communication parameters is the terminal recognition symbol; Frame number; Groove number; Time information; The identifier of said wireless base station; The identifier of paging zone; Said wireless base station provides the end packet number of service; The communication carrier number that said wireless base station provides; The desired value that mixes situation of representing the communication of said wireless base station report; End packet under the said terminal number; The communication carrier of said terminal in communication number; Perhaps be used in the random number of Control on Communication; And their combination.
8. Verification System; Said Verification System comprises terminal, server and wireless base station; Said terminal and said server carry out authentication via said wireless base station, and said terminal and said wireless base station utilize radio communication to communicate, and said server and said terminal keep shared hash function and authentication information respectively; It is characterized in that
Said terminal has:
The end side parameters for authentication obtains the unit, and temporary transient shared messaging parameter is used messaging parameter as authentication when obtaining the communication between said terminal and said wireless base station;
End side authenticate key generation unit is obtained the said authentication that obtains the unit with messaging parameter, said authentication information and said hash function based on said end side parameters for authentication, generate the 1st authenticate key; And
End side authenticate key transmitting element sends to said server via said wireless base station with said the 1st authenticate key,
Said wireless base station has:
Wireless base station side parameters for authentication obtains the unit, and temporary transient shared messaging parameter is used messaging parameter as authentication when obtaining the communication between said terminal and said wireless base station; And
Transmission unit is obtained the said authentication that obtains the unit with said wireless base station side parameters for authentication and is appended in said the 1st authenticate key that sends at said terminal with messaging parameter, sends to said server,
Said server has:
The server side receiving element has added said 1st authenticate key of said authentication with messaging parameter from the reception of said wireless base station;
Server side authenticate key generation unit, the said authentication that receives based on said server side receiving element generates the 2nd authenticate key with messaging parameter, said authentication information and said hash function; And
The server side authentication ' unit, whether the 2nd authenticate key that detects said generation is identical with said the 1st authenticate key that receives, and thus, carries out the authentication at said terminal,
Temporary transient shared said messaging parameter is that said terminal connects needed messaging parameter to said wireless base station when said communication; And be following messaging parameter: no matter whether carry out authentication, the messaging parameter that sets in the MAC-Termination ID allocation process that must carry out under the situation about between said terminal and said wireless base station, communicating.
9. employed terminal in the Verification System; Said terminal and server carry out authentication via the wireless base station, and said terminal and said wireless base station utilize radio communication to communicate, and said server and said terminal keep shared hash function and authentication information respectively; It is characterized in that having:
The end side parameters for authentication obtains the unit, obtain with the wireless base station between when communicating by letter temporary transient shared messaging parameter use messaging parameter as authentication;
End side authenticate key generation unit is obtained the said authentication that obtains the unit with messaging parameter, said authentication information and said hash function based on said end side parameters for authentication, generate the 1st authenticate key; And
End side authenticate key transmitting element sends to said server via said wireless base station with said the 1st authenticate key,
Temporary transient shared said messaging parameter is that said terminal connects needed messaging parameter to said wireless base station when said communication; And be following messaging parameter: no matter whether carry out authentication, the messaging parameter that sets in the MAC-Termination ID allocation process that must carry out under the situation about between said terminal and said wireless base station, communicating.
10. employed wireless base station in Verification System; The terminal of this Verification System and server carry out authentication via said wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively, it is characterized in that having:
Wireless base station side parameters for authentication obtains the unit, obtains when between said terminal and wireless base station, communicating by letter temporary transient shared messaging parameter and uses messaging parameter as authentication; And
Transmission unit is obtained the said authentication that obtains the unit with said wireless base station side parameters for authentication and is appended in the authenticate key that sends at said terminal with messaging parameter, sends to said server,
Temporary transient shared said messaging parameter is that said terminal connects needed messaging parameter to said wireless base station when said communication; And be following messaging parameter: no matter whether carry out authentication, the messaging parameter that sets in the MAC-Termination ID allocation process that must carry out under the situation about between said terminal and said wireless base station, communicating.
11. employed server in the Verification System; The terminal of this Verification System and said server carry out authentication via the wireless base station; Said terminal and said wireless base station utilize radio communication to communicate; Said server and said terminal keep shared hash function and authentication information respectively, it is characterized in that having:
The server side receiving element has added 1st authenticate key of authentication with messaging parameter from the reception of said wireless base station;
Server side authenticate key generation unit, the said authentication that receives based on said server side receiving element generates the 2nd authenticate key with messaging parameter, said authentication information and said hash function; And
The server side authentication ' unit, whether the 2nd authenticate key that detects said generation is identical with said the 1st authenticate key that receives, and thus, carries out the authentication at said terminal,
Said authentication is that said terminal connects needed messaging parameter to said wireless base station with messaging parameter; And be following messaging parameter: no matter whether carry out authentication, the messaging parameter that sets in the MAC-Termination ID allocation process that must carry out under the situation about between said terminal and said wireless base station, communicating.
CN2009100075558A 2005-12-19 2006-12-19 Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium Expired - Fee Related CN101505222B (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP2005364522 2005-12-19
JP2005-364522 2005-12-19
JP2005364522 2005-12-19
JP2006127546 2006-05-01
JP2006-127546 2006-05-01
JP2006127546 2006-05-01

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN2006800064435A Division CN101133420B (en) 2005-12-19 2006-12-19 Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium

Publications (2)

Publication Number Publication Date
CN101505222A CN101505222A (en) 2009-08-12
CN101505222B true CN101505222B (en) 2012-12-05

Family

ID=39129873

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2009100075558A Expired - Fee Related CN101505222B (en) 2005-12-19 2006-12-19 Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium
CN2006800064435A Expired - Fee Related CN101133420B (en) 2005-12-19 2006-12-19 Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN2006800064435A Expired - Fee Related CN101133420B (en) 2005-12-19 2006-12-19 Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium

Country Status (1)

Country Link
CN (2) CN101505222B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2931022A1 (en) * 2008-05-09 2009-11-13 France Telecom METHOD FOR AUTHENTICATING A RADIO LABEL BY A RADIO PLAYER
US8966657B2 (en) * 2009-12-31 2015-02-24 Intel Corporation Provisioning, upgrading, and/or changing of hardware
KR101589352B1 (en) * 2010-08-05 2016-01-27 닛본 덴끼 가부시끼가이샤 Communication apparatus, communication system, communication method and computer readable storage medium for storing a communication program
KR101440328B1 (en) * 2013-05-20 2014-09-17 주식회사 실리콘웍스 Method for producing a message authenticating code and authenticating device using the message authenticating code
CN104636653A (en) * 2013-11-09 2015-05-20 电子科技大学 System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment
CN110199338B (en) * 2017-01-20 2022-09-20 日本电信电话株式会社 Secret calculation system, secret calculation device, secret calculation method, and recording medium
SE545872C2 (en) * 2019-09-27 2024-02-27 No Common Payment Ab Generation and verification of a temporary authentication value for use in a secure transmission
CN112530068B (en) * 2020-10-29 2023-09-22 重庆恢恢信息技术有限公司 Personnel identification method for realizing intelligent building site through Internet of things
CN113052277A (en) * 2021-03-16 2021-06-29 中国广核电力股份有限公司 Nuclear power equipment fault prompting method and device, computer equipment and storage medium
CN116633556B (en) * 2023-05-26 2025-09-19 哈尔滨工业大学 Firewall signature authentication method and firewall-based anti-network topology discovery system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058480A (en) * 1996-06-03 2000-05-02 Cranberry Properties, Llc System for remote pass-phase authentication
US6711400B1 (en) * 1997-04-16 2004-03-23 Nokia Corporation Authentication method
CN1484409A (en) * 2002-09-17 2004-03-24 华为技术有限公司 A method for distributing encryption keys in a wireless local area network
JP2005339238A (en) * 2004-05-27 2005-12-08 Nippon Telegr & Teleph Corp <Ntt> Reading device, database device, logistics information management method and program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002288041A (en) * 2001-03-23 2002-10-04 Sony Corp Information processing device and method, program storage medium and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058480A (en) * 1996-06-03 2000-05-02 Cranberry Properties, Llc System for remote pass-phase authentication
US6711400B1 (en) * 1997-04-16 2004-03-23 Nokia Corporation Authentication method
CN1484409A (en) * 2002-09-17 2004-03-24 华为技术有限公司 A method for distributing encryption keys in a wireless local area network
JP2005339238A (en) * 2004-05-27 2005-12-08 Nippon Telegr & Teleph Corp <Ntt> Reading device, database device, logistics information management method and program

Also Published As

Publication number Publication date
CN101505222A (en) 2009-08-12
CN101133420A (en) 2008-02-27
CN101133420B (en) 2011-04-13

Similar Documents

Publication Publication Date Title
CN101505222B (en) Terminal identification method, authentication method, authentication system, server, terminal, radio base station, program, and recording medium
JP4642845B2 (en) Terminal identification method, server, terminal, and program
Lei et al. A blockchain based certificate revocation scheme for vehicular communication systems
CN101035146B (en) Wireless communication device, MAC address management system, wireless communication method, and program
CN101222325B (en) Wireless multi-hop network key management method based on ID
CN102301767B (en) Through the book keeping operation based on equipment of authentication
WO2018020943A1 (en) Number portability information management system
US10080136B2 (en) Credibility token system for over the air multi-programming of a wireless device and method of operation
Znaidi et al. Hierarchical node replication attacks detection in wireless sensor networks
CN109889522A (en) A blockchain-based IoT information security protection method
Hong et al. Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain
WO2002019682A1 (en) Advanced air time management
CN110191153A (en) Social communication method based on block chain
CN101926187A (en) Abstraction function for mobile handsets
Mars et al. Operator and manufacturer independent D2D private link for future 5G networks
CN103944975A (en) File safe sharing method based on mobile social network supporting user revocation
CN101087334B (en) Multi-user management method of mobile phone information
Zhang et al. Secure cooperative data storage and query processing in unattended tiered sensor networks
Luntovskyy et al. Energy efficiency and security for IoT scenarios via WSN, RFID and NFC
Wu et al. Data privacy protection model based on blockchain in mobile edge computing
CN101888415B (en) peer-to-peer network user credit system
CN101755436A (en) Control device, communication device, control system, control method, and storage medium
Jean de Dieu et al. Energy-efficient secure path algorithm for wireless sensor networks
Antonopoulos et al. Security data management process and its impact on smart cities' wireless sensor networks
Liu et al. Ensuring data storage security against frequency-based attacks in wireless networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121205

Termination date: 20211219