This invention relates to Wireless Internet Access systems, and in particular those based on UMTS 3G (Universal Mobile Telecommunication System 3rd Generation) mobile standards.
The UMTS standards describe a particular method by which an end-user's piece of equipment (UE) is authenticated and also the mechanism by which the UE authenticates the network (to prevent it connecting to bogus base stations). These require particular signalling from the SGSN (Serving General Packet Radio Service Support Node) element to a UMTS HLR/AuC (Home Location Register/Authentication Centre). This is covered in the following standards documents:
The standards also recommend an algorithm set for such authentication functions:
However, this known approach has the disadvantage(s) that due to the complexity of the existing standards and the relatively small market for such elements it is expensive to implement, and generally based on bespoke software, and in some cases bespoke hardware.
From patent publication no. WO 02/11467 there is known use of RADIUS (Remote Authentication Dial-In User Service) and associated protocols to authenticate network access for fixed end users and for end users who roam in a wireless system. RADIUS is standardized by the IETF (Internet Engineering Task Force) in the document:
The standards documents [1]-[5] referred to above are hereby incorporated herein by reference.
However, this known use of RADIUS supports authentication for end users using UE associated with a computer such as a PC (Personal Computer). It does not facilitate support of USIM (UMTS Subscriber Identity Module) cards in UE.
A need therefore exists for use of internet authentication technology to provide UMTS authentication services related to USIMs wherein the abovementioned disadvantage(s) may be alleviated.
In accordance with the present invention there is provided a system and a method for use of internet authentication technology to provide UMTS authentication as claimed in claim 1 and claim 15 respectively.
One system and method use of internet authentication technology to provide UMTS authentication services related to UMTS SIM cards (USIMs) incorporating the present invention will now be described, by way of example only, with reference to the accompanying drawing(s), in which:
The UMTS standards describe a particular method by which an end-user's piece of equipment (UE) is authenticated and also the mechanism by which the UE authenticates the network (to prevent it connecting to bogus base stations). These require particular signalling from the SGSN element to a UMTS Home Location Register/Authentication Centre (HLR/AuC). This is covered in the standards documents [1], [2], [3] & [4] referred to above.
As shown in
The AuC 160 generates a set of authentication and keying material, called an Authentication Vector; sets of Authentication Vectors are sent to the SGSN 150 by the AuC 170, at the request of the SGSN.
The authentication of a UE 120 occurs when it ‘attaches’ to the network:
On an attempted network attach from a UE 120, the SGSN 150 selects an existing Authentication Vector, or requests fresh Authentication Vectors from the AuC 170. The SGSN then supplies the random challenge value (RAND) and the Authentication Token (AUTN) values from the Authentication Vector to the USIM 110.
The USIM uses a shared secret value (shared with the AuC) referred to as K, plus any other parameters demanded by the authentication algorithm (the UMTS standards supply an example algorithm called MILENAGE, which has the values OP—Operator Variant Configuration Field—and AMF—Authentication Management Field) to authenticate the network by validating the AUTN value it received. The authentication algorithm also includes a scheme to prevent replay-attacks (where a sequence of authentication messages is recorded, then re-played at a later time, in order to gain un-authorised access to a service) based on synchronised changing values in the AuC to the USIM (in the MILENAGE algorithm this is achieved using a changing sequence number shared between USIM and AuC, referred to as SQN).
If the USIM authenticates the network successfully, it generates an authentication result value (RES) and sends it back to the SGSN.
The SGSN compares RES against XRES and if they match authentication completes and the UE is allowed onto the network.
When the USIM authenticates the network, it can detect out-of-synchronisation anti-replay-attack data between it and the AuC—in this case a re-synchronisation procedure is executed between the USIM and AuC and the authentication procedure is then re-executed.
As will be described in greater detail below, in its preferred embodiment the present invention is based on an Internet technology-based authentication server, using a commercial RADIUS authentication server platform, that implements the procedures such that:
As described in the present applicant's co-pending patent application Ser. No. 09/432,824 (published in equivalent form as EP 1098539) and co-pending patent application no. GB 0114813.9, the contents of which applications are hereby incorporated herein by reference, a combined RNC/SGSN may be supported in a single network element. In this configuration the function of the HLR and AuC can be replaced with a RADIUS based Internet authentication server, as described in the present applicant's co-pending patent application Ser. No. 09/626,700 (published in equivalent form as WO 02/11467), the content of which is hereby incorporated herein by reference.
The present invention is based on the realisation by the inventors that the earlier-described use of RADIUS to authenticate the UE for wireless access, can be extended by extensive modification of the signalling procedures to support the use of USIM cards in the UE. The signalling required to implement this in detail below.
The RADIUS protocol allows for vendor-specific extensions to messages. Commercial RADIUS server software also supports the addition of software functionality (‘plug-in’) to process/create RADIUS messages, including attributes added as extensions to the RADIUS protocol. The present invention is based on the realisation by the inventors that the functionality of the UMTS AuC, and the associated signalling with the SGSN, can be replaced by extensions to the RADIUS protocol and a software ‘plug-in’ on the RADIUS server.
Referring now to
The UE 220 communicates over a wireless link Uu with a base station or Node B 230 in an access network domain of a UTRAN netowrk. The Node B 230 communicates over a link Iub with an integrated network controller (INC) 240. As discussed above, the INC 240 includes an RNC (Radio Network Controller) 250, which controls and allocates the radio network resources and provides reliable delivery of user traffic between the Node B 230 and the UE 220, and an SGSN (Serving General Packet Radio Service Support Node) 260, which provides session control. The SGSN 260 incorporates a RADIUS element designated RADIUS client 263 to provide authentication and other functions, as will be described in greater detail below.
The INC 240 is connected to an Internet protocol network 265 and then to a UMTS access network operator 267, having a RADIUS server 270. The RADIUS server 270 incorporates RADIUS Accounting Functions 270A, and Authentication Functions 270B and HLR Functions 270C (these functions are shown in dashed line in
As will be explained in greater detail below, a link 290 is effectively established between the USIM 210 and authentication functionality 270B within the RADIUS server 270, allowing authetication of the USIM 210 without requiring a dedicated authentication centre and a dedicated home location register.
The RADIUS Server 270:
Referring now also to
The following table describes how the RADIUS Access-Request message and the RADIUS Access-Accept message can be constructed:
The Octet String of the RADIUS Access-Accept message is constructed as shown in the following table:
The ‘Type’ field has a vendor-specific value (e.g., 26).
The ‘Length’ field has a typical value of 80.
The ‘Vendor-ID’ field has the vendor's IANA-assigned value (e.g., 5586).
The ‘Manuf.-Type’ (Manufacturer-Type) field has the UMTS-Authentication-Vector value of 14.
The ‘Manuf.-Length’ field has a value in the range 74-78.
The Value field (RAND, CK, IK, AUTN and XRES) is 72-76 octets of concatenated authentication material to be used by the INC in Access Authentication, challenge and ciphering.
Referring now also to
The message sent from the USIM 210 to the SGSN 260 at step 430 above, signifying that the anti-replat-attack data is out of date, is constructed as shown in the following table:
The ‘Type’ field has a vendor-specific value (e.g., 26).
The ‘Length’ field has a typical value of 22.
The ‘Vendor-ID’ field has the vendor's IANA-assigned value (e.g., 5586).
The ‘Type’ field has the UMTS-Resynchronisation-Token value of 15.
The ‘Manuf.-Length’ field has a value of 16.
The Value field (AUTS) is 14 octets of concatenated authentication material to be used by the RADIUS server 270 in USIM sequence number resynchronisation.
It will be understood that by extending the signalling procedures as described above, RADIUS may be used to authenticate a USIM card in a UE for wireless access in a UMTS system, by effectively establishing a link between the USIM and authentication functionality within the RADIUS server (as shown by the link 290 in
It will be appreciated that the method described above for use of internet authentication technology to provide UMTS authentication may be carried out in software running on one or more processors (not shown) in the RADIUS server 270, the SGSN module 260 and the PC carrying the USIM 210, and that the software may be provided as a computer program element carried on any suitable data carrier (also not shown) such as a magnetic or optical computer disc.
It will be understood that the use of internet authentication technology to provide UMTS authentication services related to UMTS SIM cards (USIMs) described above provides the following advantages:
Number | Date | Country | Kind |
---|---|---|---|
0223311.2 | Oct 2002 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/GB03/04315 | 10/8/2003 | WO | 11/8/2005 |