[go: up one dir, main page]

KR980007082A - How to Update Subscriber's Secret Shared Data in Personal Communication System - Google Patents

How to Update Subscriber's Secret Shared Data in Personal Communication System Download PDF

Info

Publication number
KR980007082A
KR980007082A KR1019960020315A KR19960020315A KR980007082A KR 980007082 A KR980007082 A KR 980007082A KR 1019960020315 A KR1019960020315 A KR 1019960020315A KR 19960020315 A KR19960020315 A KR 19960020315A KR 980007082 A KR980007082 A KR 980007082A
Authority
KR
South Korea
Prior art keywords
authentication
personal communication
secret
shared data
subscriber
Prior art date
Application number
KR1019960020315A
Other languages
Korean (ko)
Other versions
KR100194959B1 (en
Inventor
류원옥
조기성
이윤주
Original Assignee
양승택
한국전자통신연구원
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 양승택, 한국전자통신연구원 filed Critical 양승택
Priority to KR1019960020315A priority Critical patent/KR100194959B1/en
Publication of KR980007082A publication Critical patent/KR980007082A/en
Application granted granted Critical
Publication of KR100194959B1 publication Critical patent/KR100194959B1/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

인증센터가 설정한 새로운 비밀 공유데이타로 단말의 비밀공유데이타를 갱신하는 방법을 제공함으로써, 개인통신 가입자 단말의 분실시 가입자가 입을 수 있는 피해를 최소화하여 가입자는 언제나 안전하고 편리한 통신을 할 수 있고, 개인통신 교환기의 효율성과 신뢰성을 높일 수 있도록 한 개인통신 시스템에서 가입자 단말의 비밀공유데이타 갱신 처리방법에 관한 것이다.By providing a method of updating the secret sharing data of the terminal with the new secret sharing data set by the authentication center, the subscriber can always communicate safely and conveniently by minimizing the damage that the subscriber can suffer in case of loss of personal communication subscriber terminal. In addition, the present invention relates to a method for updating a secret shared data of a subscriber station in a personal communication system to improve the efficiency and reliability of a personal communication exchange.

Description

개인통신 시스템에서 가입자 비밀공유데이타 갱신 처리방법How to Update Subscriber's Secret Shared Data in Personal Communication System

본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음As this is a public information case, the full text was not included.

제1도는 본 발명이 적용되는 하드웨어의 구성도.1 is a block diagram of hardware to which the present invention is applied.

Claims (3)

인증센터에서 운용상이나 가입자 인증 주기 만료에 의해 가입자의 비밀공유데이타를 갱신하고자 할때 새로운 비밀 고유데이타를 생성하고, 비밀 공유데이타 갱신처리를 위한 비밀공유데이타 랜덤값, 유일시도 랜덤값 및 유일시도인증 결과값을 실은 인증명령 메시지를 개인통신교환기로 전송하는 단계와, 상기 개인통신교환기의 개인통신 가입자 이동성 제어블럭에서 비밀공유데이타 랜덤값을 실은 비밀공유데이타 갱신요구 메시지를 수신하여 비밀공유데이타 랜덤값으로 단말내의 비밀공유데이타를 생성하고, 단말내에서 기지국유일시도 랜덤값ㅇㄹ 생성하여 이를 기지국유일시도 요구 메시지에 싫어 개인통신교환기로 전송하는 단계와 인증센터에서 개인통신 교환기로부터 수신한 기지국유일시도 요구 메시지내의 기지국유일시도 랜덤값을 이용하여 인증센터 내의 기지국유일시도 인증값을 생성하여 개인통신교환기로 전송하는 단계와 상기 단말에서 인증센터로 부터 수신한 기지국유일시도 인증값이 자신의 것과 같은지를 비교하여 같으면 단말의 비밀공유데이타를 갱신하고, 비밀공유데이타 변경응답 메시지를 개인 통신교환기로 전송하는 단계와, 개인통신 가입자 이동성 제어블럭에서 비밀공유데이타 변경응답메시지내의 비밀공유데이타 갱신이유 정보를 살펴 기지국유일시도를 성공한 경우에는 비밀공유데이타 갱신정보에 성공을 저장하고, 실패한 경우는 비밀공유데이타 갱신정보에 실패를 저장하고, 단말로 유일시도 랜덤값을 실은 인증요구 메시지를 전송하는 단계와, 단말에서 수신한 인증요구 메시지 내의 유일시도 랜덤값으로 단말내의 유일시도 인증값을 생성하여 인증요구응답 메시지에 실어 개인통신 교환기로 전송하는 단계와, 개인통신 가입자 이동성 제어블럭에서 인증요구응답 메시지를 수신하여 메시지 내의 유일시도 인증값이 인증센터로 부터 수신한 유일시도 인증값과 같은지를 비교하고, 비교한 결과는 유일시도인증정보에 저장하고, 비밀공유데이타 갱신정보와 함께 인증상태보고 메시지에 저장하여 인증센터로 전송하는 단계와, 인증센터에서 수신한 인증상태보고 메시지내의 비밀공유데이타 갱신정보와 유일시도 인증정보를 살펴 비밀공유데이타 갱신정보가 성공인 경우는 인증센터 내의 가입자 비밀공유데이타를 새로이 생성한 비밀공유데이터로 갱신하고, 그 외에는 가입자의 비밀공유데이타를 변경하지 않고, 가입자의 비밀공유데이타 갱신처리 성공 또는 실패 여부를 인증상태통보응답 메시지에 실어 개인통신교환기로 전송하는 단계와, 개인통신 가입자 이동성 제어 블럭에서 인증상태통보응답 메시지를 수신하여 비밀공유데이타 개이신처리 절차의 성공 또는 실패를 판단하는 단계로 이루어진 것을 특징으로 하는 개인통신 시스템에서 가입자 비밀공유데이타 갱신 처리방법.When the authentication center tries to update the subscriber's secret shared data due to the operation or expiration of the subscriber's authentication cycle, a new secret unique data is generated, and the secret shared data random value, unique attempt random value, and unique attempt authentication for the secret shared data update processing are generated. Transmitting the authentication command message including the result value to the personal communication exchange, receiving a secret sharing data update request message containing the secret sharing data random value from the personal communication subscriber mobility control block of the personal communication exchange, and receiving the secret sharing data random value. Generate the secret shared data in the terminal, randomly generate the base station unique attempt value in the terminal, disregard this in the base station unique attempt request message, and transmit it to the personal communication exchange and request the base station unique attempt received from the personal communication exchange in the authentication center. The base station unique attempt random value in the message By generating a base station unique attempt authentication value in the authentication center and transmitting it to the personal communication exchange and comparing the base station unique attempt authentication value received from the authentication center in the terminal with the same as its own, update the secret shared data of the terminal. And transmitting the secret sharing data change response message to the personal communication exchange, and if the base station unique attempt is successful by examining the reason for updating the secret sharing data in the secret sharing data change response message in the personal communication subscriber mobility control block. Storing the success in the update information, and in case of failure, storing the failure in the secret shared data update information, transmitting an authentication request message containing a random value to the terminal, and generating a randomness in the authentication request message received from the terminal. Authentication request is generated by generating unique attempt authentication value in the terminal. Transmitting the response message to the personal communication exchange, receiving an authentication request response message from the personal communication subscriber mobility control block, and comparing whether the unique attempt authentication value in the message is the same as the unique attempt authentication value received from the authentication center; The result of the comparison is stored in the unique attempt authentication information, stored in the authentication status report message along with the secret shared data update information, and transmitted to the authentication center, and the secret shared data update information in the authentication status report message received from the authentication center. If the unique shared data update information is successful, the subscriber's secret sharing data in the authentication center is updated with newly created secret sharing data. Otherwise, the subscriber's secret sharing data is not changed. The authentication status notification response message indicates whether the data update process succeeded or failed. Transmitting to the personal communication exchange, and receiving the authentication status notification response message from the personal communication subscriber mobility control block to determine the success or failure of the confidential data transfer process. How to handle confidential shared data updates. 제1항에 있어서, 상기 단말에서 인증센터로 부터 수신한 기지국유일시도 인증값이 자신의 것과 같은지를 비교하여 같으면 단말이 새로이 생성한 비밀공유데이타로 가입자의 데이타를 수정하는 단계와, 비밀공유데이타 갱신이유 정보에 갱신에 성공했음을 비밀공유데이타로 가입자의 데이타를 수정하는 단계와, 단말은 비밀공유데이타 변경응답 메시지를 개인통신교환기로 전송하는 단계로 이루어진 것을 특징으로 하는 개인통신 시스템에서 가입자 비밀공유데이타 갱신 처리방법.The method of claim 1, further comprising the steps of modifying the subscriber's data with the newly created secret shared data when the terminal compares whether the base station unique attempt authentication value received from the authentication center is the same as its own, and the secret shared data. Modifying the subscriber's data with the secret sharing data indicating that the update was successful in the reason for the update, and transmitting the secret sharing data change response message to the personal communication exchange to the subscriber's secret sharing in the personal communication system. How to handle data updates. 제1항에 있어서, 상기 단말에서 인증센터로 부터 수신한 기지국유일시도 인증값이 자신의 것과 같은지를 비교하여 틀리면 가입자의 비밀공유데이타를 수정하지 않고 비밀공유데이타 갱신이유 정보에 갱신에 실패했음을 비밀공유데이타 변경응답 메시지에 저장하는 단계와, 단말은 비밀공유데이타 변경응답메시지를 개인통시교환기로 전송하는 단계로 이루어진 것을 특징으로 하는 개인통신 시스템에서 가입자 비밀공유데이타 갱신 처리방법.The method according to claim 1, wherein if the base station unique attempt authentication value received from the authentication center is the same as that of its own, the terminal fails to update the secret shared data update reason information without modifying the subscriber's secret shared data. Storing the shared data change response message; and transmitting the secret shared data change response message to the personal communication exchange. ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.※ Note: The disclosure is based on the initial application.
KR1019960020315A 1996-06-07 1996-06-07 How to Update Subscriber's Secret Shared Data in Personal Communication System KR100194959B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1019960020315A KR100194959B1 (en) 1996-06-07 1996-06-07 How to Update Subscriber's Secret Shared Data in Personal Communication System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1019960020315A KR100194959B1 (en) 1996-06-07 1996-06-07 How to Update Subscriber's Secret Shared Data in Personal Communication System

Publications (2)

Publication Number Publication Date
KR980007082A true KR980007082A (en) 1998-03-30
KR100194959B1 KR100194959B1 (en) 1999-06-15

Family

ID=66284197

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019960020315A KR100194959B1 (en) 1996-06-07 1996-06-07 How to Update Subscriber's Secret Shared Data in Personal Communication System

Country Status (1)

Country Link
KR (1) KR100194959B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100334639B1 (en) * 1998-12-10 2002-10-19 텔슨전자 주식회사 How to Give Terminal Unique Number in Wireless Calling System

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100506271B1 (en) * 1997-12-30 2005-09-26 삼성전자주식회사 How to update environmental data of mobile communication terminal by service center
KR102244674B1 (en) 2020-09-09 2021-04-26 (주)지산개발 Precasted long-span hollow beam

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100334639B1 (en) * 1998-12-10 2002-10-19 텔슨전자 주식회사 How to Give Terminal Unique Number in Wireless Calling System

Also Published As

Publication number Publication date
KR100194959B1 (en) 1999-06-15

Similar Documents

Publication Publication Date Title
EP1430640B1 (en) A method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device
EP1833230B1 (en) Wireless communication device, MAC address management system, wireless communication method, and program
US7050797B2 (en) Remote control system in mobile communication terminal and method thereof
US8848912B2 (en) Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium
US6148205A (en) Method and apparatus for secure registration within an in-home wireless network
EP0915630B1 (en) Strengthening the authentification protocol
CN1245040C (en) A wireless communication security system that prevents security keys from being too short-lived
US20070101142A1 (en) Wireless adhoc communication system, terminal, authentication method for use in terminal, encryption method, terminal management method, and program for enabling terminal to perform those methods
US20060141987A1 (en) Identification of a terminal with a server
US8607333B2 (en) Radio frequency identification (RFID) security apparatus having security function and method thereof
JPH07115413A (en) Mobile communication terminal authentication system
CN1283906A (en) Method and device for replacting secret keys by two-way confirmation
US6144949A (en) Radio frequency communication system with subscribers arranged to authenticate a received message
US20050182802A1 (en) Method of updating an authentication algorithm in a computer system
JP2723415B2 (en) Authentication method
KR980007082A (en) How to Update Subscriber's Secret Shared Data in Personal Communication System
CN101026866A (en) AK context cache method for wireless communication system
US6118993A (en) Effective use of dialed digits in call origination
KR980007081A (en) Unique Attempt Authentication in Personal Communication System
JPWO2002076011A1 (en) Cryptographic communication system
JPS6051341A (en) Cipher control method of communication terminal
KR100638217B1 (en) Mobile terminal authentication system and its authentication method
CN116722983B (en) Information security method and system for Internet of things terminal in urban planning field
CN116567858B (en) A cross-platform BLE device automatic connection method
KR100458955B1 (en) Security method for the Wireless LAN

Legal Events

Date Code Title Description
A201 Request for examination
PA0109 Patent application

Patent event code: PA01091R01D

Comment text: Patent Application

Patent event date: 19960607

PA0201 Request for examination

Patent event code: PA02012R01D

Patent event date: 19960607

Comment text: Request for Examination of Application

N231 Notification of change of applicant
PN2301 Change of applicant

Patent event date: 19970402

Comment text: Notification of Change of Applicant

Patent event code: PN23011R01D

PG1501 Laying open of application
E701 Decision to grant or registration of patent right
PE0701 Decision of registration

Patent event code: PE07011S01D

Comment text: Decision to Grant Registration

Patent event date: 19981130

GRNT Written decision to grant
PR0701 Registration of establishment

Comment text: Registration of Establishment

Patent event date: 19990210

Patent event code: PR07011E01D

PR1002 Payment of registration fee

Payment date: 19990211

End annual number: 3

Start annual number: 1

PG1601 Publication of registration
PR1001 Payment of annual fee

Payment date: 20020131

Start annual number: 4

End annual number: 4

PR1001 Payment of annual fee

Payment date: 20030130

Start annual number: 5

End annual number: 5

PR1001 Payment of annual fee

Payment date: 20040202

Start annual number: 6

End annual number: 6

PR1001 Payment of annual fee

Payment date: 20050131

Start annual number: 7

End annual number: 7

PR1001 Payment of annual fee

Payment date: 20060201

Start annual number: 8

End annual number: 8

PR1001 Payment of annual fee

Payment date: 20070131

Start annual number: 9

End annual number: 9

FPAY Annual fee payment

Payment date: 20080131

Year of fee payment: 10

PR1001 Payment of annual fee

Payment date: 20080131

Start annual number: 10

End annual number: 10

LAPS Lapse due to unpaid annual fee
PC1903 Unpaid annual fee

Termination category: Default of registration fee

Termination date: 20100109