The present application claims priority from Japanese application JP2007-328136 filed on Dec. 20, 2007, the content of which is hereby incorporated by reference into this application.
The present invention relates to a technology to connect a terminal having no user identification information to a network that requires a terminal user authentication. More specifically, the invention relates to a safe, convenient method of authenticating a terminal when the terminal connects to an IMS (IP Multimedia Subsystem) network defined by 3GPP (Third Generation Partnership Project) and 3GPP2 (Third Generation Partnership Project 2), mobile phone standardization organizations.
The third generation (3G) network for mobile phones is a technology that seeks to consolidate two paradigms of the mobile phone network and the Internet. The IMS (IP Multimedia Subsystem) technology is a key to a 3G architecture that realizes ubiquitous wireless access to whatever service the Internet provides. The standardization of the IMS is under way by the standardization organization 3GPP (Third Generation Partnership Project) and 3GPP2 (Third Generation Partnership Project 2). The IMS is designed to be able to operate also when an access path leading to nodes making up the system is not a mobile phone network, and is adopted by the Next Generation Network (NGN) that aims to integrate the fixed telephone network and the broadband access network such as ADSL.
Mounting the IMS on the NGN allow the same method as used in the mobile phone to be performed in the subscriber identification and authentication for other devices than mobile phones, such as fixed line telephones and personal computers (PCs), providing telecommunications carriers with merits in building a system. The use of the IMS also offers subscribers such merits as being able to unify contracts of mobile phone and fixed line phone and to seamlessly receive services from carriers through internet access using mobile phones and PCs. The IMS as defined by GPP/3GPP2 uses an IC card called UICC (Universal Integrated Circuit Card) mounted in a terminal to authenticate the subscriber using the 3G mobile phone terminal. The authentication of a subscriber is done based on a long-term shared private key stored in both the authenticating IMS system and the terminal IC card (3GPP TS 24.228, 3GPP TS 33.102, 3GPP TS 33.102).
On the other hand, to solve a problem of being unable to provide users with multimedia content with satisfactory quality because of limitations on the processing capability, memory capacity and display size of the mobile phone terminal, a proposal is being made to improve convenience for the users in viewing multimedia content by linking the mobile phone terminals to relatively sophisticated terminals such as PCs (JP-A-2002-358260).
When a user using a terminal with no user identification information attempts to connect to a network that requires authentication, the user needs to enter information necessary for authentication into the terminal by some means. Take for example a situation where the user wishes to use a mobile phone when he is out but, at home, use a fixed phone. Because the authentication of a terminal in the IMS (IP Multimedia Subsystem) requires a loading into the terminal of an IC card, when the user wants to use other terminal temporarily he or she needs to move the IC card into the second terminal he is going to use in order to make the system recognize that the user of that terminal is the same subscriber of the first terminal. This is inconvenient. This invention solves this first problem by obviating the need to move the IC card from one terminal to another.
Consider a case of moving an IC card into a device installed in a place away from the user's office. There is a security problem here, such as the long-term shared private key stored in the IC card being illicitly stolen and recorded into other terminals. This invention solves this second problem by eliminating the step of moving the IC card to keep the long-term shared private key secret from other terminals. Further, when the user wishes to play in other device a multimedia content that cannot be played in a mobile phone, a method such as described in JP-A-2002-358260 may be used. However, when a content provider attempts to offer a service that requires identification of a subscriber, such as when delivering a “content that can only be viewed when the mobile phone subscriber has a contract for that service, this cannot be realized with the method of JP-A-2002-358260. This invention solves this third problem by transferring user identification information to other devices to enable a content provider to identify a subscriber.
This invention provides a means which enables a linked terminal not having user identification information to work as a mobile terminal by transferring the user identification information of the mobile terminal to the separate linked terminal.
A linked terminal connected to an authentication device having user identification information and to a user authentication server is provided. The linked terminal comprises: a first communication interface to communicate with the authentication device; a second communication interface to communicate with the user authentication server; and a program execution unit; wherein when it receives a first message including the user identification information from the authentication device through the first communication interface, the program execution unit retrieves the user identification information from the first message and sends a second message including the user identification information to the user authentication server through the second communication interface; wherein when it receives a third message including a parameter generated by the user authentication server from the user authentication server through the second communication interface, the program execution unit sends to the authentication device through the first communication interface a message requesting the authentication device to process the parameter by using a private key shared by the authentication device and the user authentication server.
Because the linked terminal can be made to work as a mobile terminal without transferring an IC card, the user of the mobile terminal can use other terminals more easily than in the case with conventional terminals. By preventing illicit reading of a private shared key, public terminal facilities at places away from office can be used with high level of security. Further, since the system side recognizes the user of a public terminal to be the same subscriber of the mobile terminal, the public terminal can be used with the subscriber contract state of the mobile terminal made available to the public terminal. The system side does not need to have a dedicated function to authenticate terminals other than the mobile terminal, assuring an effective use of facilities of a system holder.
Embodiments of this invention will be described by referring to the accompanying drawings.
An SIP proxy server P-CSCF1 (Proxy-Call/Session Control Function) 400 is connected to an access network 600 to which the mobile terminal 100 is connected. The proxy server has a function defined by the 3GPP (Third Generation Partnership Project) and 3GPP2 (Third Generation Partnership Project 2). The P-CSCF1400 is allocated to the user at time of user registration and is connected to the user through the access network. Communication with the user terminal after authentication is carried out under IPsec. The P-CSCF1400 directly sends and receives a request for SIP (Session Initiation Protocol) with the mobile terminal 100. An SIP proxy server P-CSCF2500 is connected to an access network 700 to which the linked terminal 200 is connected. The P-CSCF2500 has a function defined by the 3GPP/3GPP2. The P-CSCF2500 directly transfers an SIP request to and from the linked terminal 200.
The access network 600 is designed to connect the mobile terminal 100 to an IMS shared network 800 and has no limitations on its topology or architecture. In this embodiment, a GPRS (General Packet Radio Service) in 3G is contemplated for implementation. It is positioned as a roaming network in IMS. The access network 700 working is designed to connect the linked terminal 200 to the IMS shared network 800 and has no limitations on its topology or architecture. In this embodiment, Internet connections (such as dial-up connections, ADSL (Asymmetric Digital Subscriber Line) connections and FTTH (Fiber to The Home) connections) are contemplated. It is positioned as a roaming network. The IMS shared network 800 functioning in IMS is designed to interconnect the access network 600, access network 700 and IMS home network 900 and has no limitations on its topology or architecture. The IMS home network 900 is connected to the IMS shared network 800 and has no limitations on its topology or architecture. The IMS home network 900 is managed by a carrier with which the subscriber using the mobile terminal 100 has signed up, and is connected with nodes from which to provide services to subscribers.
An SIP proxy I-CSCF 910 is connected to the IMS home network 900 and has a function defined by 3GPP/3GPP2. The I-CSCF 910 is included in the IMS home network 900 and identifies an HSS 930 that stores subscriber information of a user who is going to make a registration. Next, upon instruction from the HSS 930, the I-CSCF 910 hands the registration operation over to an S-CSCF 920. It also receives an SIP request transferred from the P-CSCF1400 connected to the access network 600 and from the P-CSCF2500 connected to the access network 700. SIP URI (Uniformed Resource Identifier) of the I-CSCF (Interrogating-Call/Session Control Function) is registered with a DNS (Domain Name Server) on the IMS shared network and associated with a domain name of the IMS home network. For this reason, the I-CSCF constitutes a gate for the P-CSCF when it attempts to make a connection to the IMS home network.
The SIP proxy server S-CSCF (Serving-Call/Session Control Function) 920 is connected to the IMS home network 900 and has a function defined by 3GPP/3GPP2. The S-CSCF 920 manages user identification information, profile information of services that subscribers have signed up for, and authentication information. It receives SIP requests transferred from the I-CSCF 910. A particular S-CSCF 920 is assigned to each subscriber and provides the associated services to the assigned subscribers. An application server HSS (Home Subscriber Server) 930 is connected to the IMS home network 900 and has a function defined by 3GPP/3GPP2. It stores all information on subscribers and holds a database on details of contract situations. It communicates with the I-CSCF 910 and S-CSCF 920 under a Diameter protocol (RFC 3588). An application server AS (Application Server) 940 is connected to the IMS home network 900 and has a function defined by 3GPP/3GPP2. It also has applications for providing subscribers with services and an interface with HSS 930.
A display output unit 108 is used to display information for the user. This can be realized with a liquid crystal display or the like. An input unit 109 is used by the user to enter a program start instruction or the like. This can be realized with, for instance, a keyboard. An IC card reading unit 110 is a device to read information recorded in an IC card 112 loaded in an IC card loading unit 111. It can be implemented in the same way as a 3G mobile phone terminal. The IC card loading unit 111 accommodates the IC card 112 and connects to the IC card reading unit 110. It can be implemented in the same way as a 3G mobile phone terminal. The IC card 112 is recorded with user identification information defined by 3GPP TS 31.103. It can be implemented in the same way as a 3G mobile phone terminal. The communication program 113 is stored in the memory 107 and describes a procedure to perform an inter-process communication with a communication program 213 mounted in the linked terminal 200.
A program execution unit 205 is a processor that executes (or runs) a program stored in memory. It can be implemented with a general-purpose processor such as CPU. A control unit 206 performs an overall control of the entire device, such as managing function units connected to a bus and controlling data transfer timings. A memory 207 stores a communication program 213. A display output unit 208 is used to display information for the user. This can be realized with a liquid crystal display or the like. An input unit 209 is used by the user to enter a program start instruction or the like. This can be realized with a keyboard, for instance. A communication program 213 is stored in the memory 207 and describes a procedure to perform an inter-process communication with the communication program 113 mounted in the mobile terminal 100.
Next, the communication program 213 sends a communication start request to the mobile terminal 100 thus set (2014). The communication program 113 receives the communication start request sent from the communication program 213 (1012). Here, the communication program 113 may check if it can connect to the linked terminal 200. In this embodiment, however, this step is omitted. Next, the communication program 113 sends a communication start response to the communication program 213. The communication program 213 receives the communication start response from the communication program 113 (2015). With this reception complete, the communication between the communication programs 113 and 213 is made possible. Next, in both the communication programs 113, 213, their communication state in an internal memory is updated to an online state (1014, 2016) and the communication start subroutine is ended.
Next, the communication program 113 calculates the authentication information from the RAND received from the communication program 213 during the operation 1031 and from the long-term private key (KI) 117 read by the operation 1032. The authentication information represents three pieces of information, i.e., RES (response value to the challenge value), CK (session key for encryption) and IK (session key for integrity assurance). The calculation method conforms to the algorithm defined by 3GPP TS 33.102. At this timing, the communication program 113 checks the legitimacy of the network authentication token AUTN to complete the network authentication. Then, the communication program 113 sends the authentication information (RES, CK, IK) calculated by the operation 1023 to the communication program 213 (1034). The communication program 213 receives the authentication information from the communication program 113 and ends the authentication calculation subroutine.
In
The AS 940 receives the request transferred from the S-CSCF 920 and checks with the HSS 930 to see if the request transmission source IMPU 115 has made a contract for the service ID attached to the request (4004). Based on the IMPU 115 and the service ID, the HSS 930 searches through its database and returns the search result on the contract situation to the AS 940 (4005). The AS 940 receives the contact situation check result from the HSS 930 and, if there is a contract, sends a response to the S-CSCF 920 to enable it to continue the subsequent operations (4006). If it is found the IMPU has done illicit activities or not signed a contract, the AS 940 sends an error response to the S-CSCF 920. If the contract is found normal, the S-CSCF 920 transfers to the content provider the SIP INVITE request that was transmitted from the linked terminal 200 (4007).
The content provider operates as a SIP UA and issues an SIP 20 OK response (4008). The SIP 200 OK response is sent through the S-CSCF 920 and P-CSCF2500 to the linked terminal 200 (4009, 4010). When this request arrives at the linked terminal 200, an SIP session is established between the linked terminal 200 and the content provider so that a data transfer can be done. At the start of the normal SIP session, notification of the QoS (Quality of Service) capability and content playback capability and check on the QoS resource allocation are performed in addition to the operations shown in
As shown in the example of
In the example of IP-TV 6002 (top tier in
In the example of PC 6003 (middle tier), the PC 6003 is registered on the IMS system as the linked terminal 200. Once registered on the IMS system, a terminal can make calls to and receive calls from other IMS terminals. That is, a SIP session can be transmitted from other IMS terminals to the IMPU 115 (transferred from the mobile terminal 100) of the linked terminal 200, making services feasible, for example, allowing a TV phone terminal 6006 to make a call to the PC 6003 or linked terminal 200 to initiate a TV phone session.
In an example of a public telephone 6004 (bottom tier of
This invention has features that the IMPU 115 is transferred between the mobile terminal 100 and the linked terminal 200 through the near-end communication and that the long-term shared private key 117 is not transferred to the linked terminal 200. These features allow for preventing illicit use of the linked terminal 200 as practically as possible. This offers a possibility of the linked terminal 200 being transformed into a public facility, which is important in industrial point of view. If the linked terminal 200 can be made publicly available, the user does not need to hold or carry the linked terminal 200 in the above three situations and can use services by using a public linked terminal 200 away from office, on business trip or outdoors.
If the linked terminal 200 is a public facility, there is a possibility that the linked terminal 200 having the IMPU 115 of the user may be used by other person following the use of that linked terminal 200. To prevent this the IMPU 115 of the linked terminal 200 needs to be disabled. This can be achieved by the user on the linked terminal 200 performing a re-registration operation (according to 3GPP TS 24.228) on the same IMPU 115. This is because when the IMPU 115 is drawn close to the mobile terminal 100 from the linked terminal 200, the contact address of the mobile terminal 100 can be associated with the IMPU 115 by the IMS system while at the same time resetting the association between the contact address of the linked terminal 200 and the IMPU 115.
The second embodiment expands embodiment 1 to enhance security. It offers a configuration in which the mobile terminal 100 obtains a disposable user ID in advance so as to keep ID information in the IC card 112 from being disclosed to the linked terminal 200. This embodiment is explained as follows by referring to the drawings. This embodiment, as shown in
The one-time ID issue request (5001) is made by the mobile terminal 100 to the one-time ID issuing server 450 prior to the authentication operation with the linked terminal 200. The one-time ID issuing server 450, upon receiving the one-time ID issue request, performs a string-attaching registration on the HSS 930 to match one or more one-time IDs to a genuine ID (IMPI 114, IMPU 115) of the mobile terminal 100 (5002). After receiving a string-attaching registration acknowledge response (5003), a one-time ID is issued to the mobile terminal 100 (5004). With the above operations performed, a communication start request and a communication start response are transmitted between the mobile terminal 100 and the linked terminal 200, as in
The mobile terminal 100, upon receiving an ID transfer request from the linked terminal 200 (5007), returns the one-time ID transfer request (5008). What the linked terminal 200 receives is only a disposable one-time ID from which the user cannot be identified. So, there is no possibility of the user communication history remaining in the linked terminal 200. The ID transfer request is transferred to the proxy server 550 which instead performs the registration on the IMS network. Unlike embodiment 1, the HSS searches the string-attached genuine ID from the one-time ID (5015). Then, operations similar to those of embodiment 1 are performed. The authentication calculation request (5022) is transmitted from the proxy server 550 to the mobile terminal 100 through the linked terminal 200.
The content downloading by the linked terminal 200 following the IMS registration operation is done via the proxy server 550. In this embodiment, when the IMS registration is completed, since the proxy server is associated with the IMPU 115 of the mobile terminal 100, the IMS system side (P-CSCF2500, S-CSCF920, HSS 930, etc.) can decide that the proxy server 550 is being used by a subscriber of the mobile terminal 100. Unlike embodiment 1, the proxy server 550 is registered with the IMS network to receive services.
When the linked terminal 200 downloads content from a content provider, it makes a content download transfer request to the proxy server 550. This allows the user to safely use unspecified linked terminals 200 on the streets by preventing the linked terminal 200 from having a session. Further, since the proxy server 550 is interposed between the linked terminal 200 and the content provider, a content delivery source can be concealed from the linked terminal 200.
Let us consider a situation where the user away from home wishes to view a video recorded in a home DVD recorder by using a TV or the linked terminal 200 connected to the network. The user downloads the video to the linked terminal 200 from the DVD recorder through a home gateway of his house. At this time, if the proxy server 550 is not interposed between them, there is a possibility of personal information, such as URL of the home gateway, being recorded in the linked terminal 200. By putting the proxy server 550 in between, only the video of a DVD player can be downloaded without revealing URL of a distribution source to the linked terminal 200, thus further enhancing the level of security. Further, a time limit is set for the use of one-time ID to prevent an unauthorized access to services. For example, when the linked terminal 200 illegitimately holds a one-time ID in an attempt to receive service without a permission of the user, an illicit use can be prevented by checking the time limit of use of one-time ID when checking the service contract information with the HSS 930 in
It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2007-328136 | Dec 2007 | JP | national |