ImageVerifierCode 换一换
格式:PDF , 页数:19 ,大小:112.26KB ,
资源ID:738933      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-738933.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 102 310-2012 Smart Cards Extensible Authentication Protocol support in the UICC (Release 9) (V9 1 0 Release 9)《智能卡 UICC中支持的可扩展鉴权协议 版本9 1 0 R9》.pdf)为本站会员(tireattitude366)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 102 310-2012 Smart Cards Extensible Authentication Protocol support in the UICC (Release 9) (V9 1 0 Release 9)《智能卡 UICC中支持的可扩展鉴权协议 版本9 1 0 R9》.pdf

1、 ETSI TS 102 310 V9.1.0 (2012-09) Smart Cards; Extensible Authentication Protocol support in the UICC (Release 9) Technical Specification ETSI ETSI TS 102 310 V9.1.0 (2012-09)2Release 9 Reference RTS/SCP-T0013v910 Keywords card, protocol, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis

2、 Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present do

3、cument may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of th

4、e PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/s

5、tatus.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction ex

6、tend to reproduction in all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Membe

7、rs and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 102 310 V9.1.0 (2012-09)3Release 9 Contents Intellectual Property Rights 4g3Foreword . 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informativ

8、e references 6g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 Introduction 6g35 Architecture 7g35.1 Architectural Principles 7g35.2 EAP clients discovery 8g35.3 EAP-capable-application selection . 9g35.4 Key derivation 9g35.5 Authentication Status . 9g36 EAP relate

9、d Commands . 9g36.1 EAP Authenticate . 9g36.1.1 Command description . 9g36.1.1.1 Command parameters and data . 10g36.2 Specific status conditions returned . 11g36.2.1 Status words 11g37 EAP Files 12g37.1 EFEAPKEYS(EAP derived keys) . 12g37.2 EFEAPSTATUS(EAP Authentication STATUS) . 13g37.3 EFPUId(Pe

10、rmanent User Identity) 13g37.4 EFPs(Pseudonym) . 14g37.5 EFCurID(Current Identity) 14g37.6 EFReID(Re-Authentication Identity) 15g37.7 EFRealm(Realm value of the identity) 16g3Annex A (normative): List of SFI Values . 17g3A.1 List of SFI Values at the DFEAPLevel 17g3Annex B (informative): Change hist

11、ory . 18g3History 19g3ETSI ETSI TS 102 310 V9.1.0 (2012-09)4Release 9 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and no

12、n-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Purs

13、uant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present doc

14、ument. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Smart Card Platform (SCP). The contents of the present document are subject to continuing work within TC SCP and may change following formal TC SCP approval. If TC SCP modifies the contents of the present

15、 document, it will then be republished by ETSI with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 0 early working draft; 1 presented to TC SCP for information; 2 presented to TC SCP for approval; 3 or greater indicates TC

16、SCP approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. ETSI ETSI TS 102 310 V9.1.0 (2012-0

17、9)5Release 9 1 Scope The present document defines additional features that are to be provided by the UICC to support EAP authentication capabilities. The goal of these new features is to adapt the UICC to provide support of different EAP methods, ensuring interoperability between the UICC and any te

18、rminal independently of their respective manufacturers. The present document defines: The architectural framework. The additional commands required. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific r

19、eferences, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. In the case of a reference to a TC SCP document, a non specific reference implicitly refers to the latest version of that document in the same Rele

20、ase as the present document. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term va

21、lidity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. 1 IETF RFC 3748: “Extensible Authentication Protocol (EAP)“. NOTE: See at http:/www.ietf.org/rfc/rfc3748.txt. 2 ETSI TS 102 221: “Smart cards; UICC-Terminal interface; Physi

22、cal and logical characteristics“. 3 IETF RFC 2716: “PPP EAP TLS Authentication Protocol“. NOTE: See at http:/www.ietf.org/rfc/rfc2716.txt. 4 IETF RFC 4282: “The Network Access Identifier“. NOTE: See at http:/www.ietf.org/rfc/rfc4282.txt. 5 IETF RFC 2661: “Layer Two Tunneling Protocol L2TP“. NOTE: Se

23、e at http:/www.ietf.org/rfc/rfc2661.txt. 6 IETF RFC 1661: “The Point-to-Point Protocol (PPP)“. NOTE: See at http:/www.ietf.org/rfc/rfc1661.txt. 7 IEEE Std 802.1X-2004: “IEEE Standard for Local and metropolitan area networks Port-Based Network Access Control“. 8 IEEE Std 802.11-2007: “Telecommunicati

24、ons and information exchange between systems - Local and Metropolitan Area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications“. ETSI ETSI TS 102 310 V9.1.0 (2012-09)6Release 9 2.2 Informative references The following reference

25、d documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. Not applicable. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: authentica

26、tor: end of the EAP link initiating EAP authentication peer or supplicant: end of the EAP Link that responds to the authenticator 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AKA Authentication and Key Agreement DF Dedicated File DO Data Object EAP E

27、xtensible Authentication Protocol EF Elementary FileL2TP Layer two Tunnelling Protocol LAN Local Area Network MSK Master Session Key NAI Network Access Identifier PPP Point-to-Point Protocol TLS Transport Layer Security UTF UCS Transformation FormatWEP Wired Equivalent Privacy 4 Introduction The Ext

28、ensible Authentication Protocol is a general authentication framework, which supports multiple authentication methods. EAP typically may run directly over data link layers such as PPP (see RFC 1661 6) or IEEE Std 802.1X-2004 7 and IEEE Std 802.11-1999 8. As described in RFC 3748 1, EAP implementatio

29、ns consist of three main components: A lower layer that is responsible for transmitting and receiving EAP frames between the peer and the authenticator. EAP has been run over a variety of lower layers (including PPP, IEEE 802 LANs, IEEE 802.11 WLANs, and L2TP (see RFC 2661 5). An EAP layer that rece

30、ives and transmits EAP packets via the lower layer, implements duplicate detection and retransmission, and delivers and receives EAP messages to and from EAP methods. EAP methods that implement the authentication algorithms and receive/transmit EAP messages via the EAP layer. ETSI ETSI TS 102 310 V9

31、.1.0 (2012-09)7Release 9 The UICC offers suitable possibilities for the implementation of some of these EAP methods in the peer side, since it provides the required protection of credentials and authentication algorithms. This is even more important when the following conditions apply: The authentic

32、ation methods require the usage of credentials that are stored in the UICC. For security reasons, these credentials are not to be revealed in clear in an unprotected peer environment (e.g. a laptop or mobile terminal). The present document defines the principles that shall be implemented in the UICC

33、 in order to enable that UICC applications may support one or more of these EAP methods. 5 Architecture 5.1 Architectural Principles The following architectural principles are applied: The authenticator is able to perform an EAP authentication process (using an specific EAP method) with a UICC appli

34、cation implementing this method. That means that the authentication is performed end-to-end between the authenticator and the UICC application. The peer is composed of several components: - The UICC EAP Framework provides information to the terminal about the existing UICC applications that provide

35、UICC EAP clients. - A UICC application provides one or more UICC EAP clients. - A UICC EAP client implements one specific EAP method. UICC AUTHENTICATOR UICC Application 1 EAP method EAP method 1 EAP Layer EAP lower layer UICC Application 2 EAP method 2 EAP method 1 TERMINAL UICC EAP Framework EAP L

36、ayer EAP lower layer SUPPLICANT Figure 5.1: EAP architecture when supplicant is split between a UICC and a terminal ETSI ETSI TS 102 310 V9.1.0 (2012-09)8Release 9 5.2 EAP clients discovery When a UICC application implements one or more EAP clients, its corresponding record in EFDIRshall contain the

37、 following EAP related Data Objects: Application EAP support types list: defining the EAP methods supported by the corresponding UICC application. Application EAP Dedicated File list: defining a list of Dedicated Files, each of them associated to one supported EAP method. Likewise, each EAP method i

38、s associated to one DF. Each of this DF are hereafter referred as DFEAP. Application EAP Label: Defining a user readable label defining the EAP clients. Table 5.1: Coding of EAP related DOs Bytes Length Description Status 1 1 Discretionary template tag = 73 M 2 1 Length of the discretionary template

39、 = X M 3 to (2+X) X Discretionary Template X Table 5.2: Coding of EAP Discretionary Template related DOs Bytes Length Description Status 1 1 EAP Application service specific data content tag =A0 M 2 1 EAP Application service specific data content length = Y M 3 to (2+Y) Y EAP Application service spe

40、cific data content M Table 5.3: Coding of EAP Application Service Specific Data Content related DOs Bytes Length Description Status 1 1 Application EAP supported types list tag = 80 M 2 1 Length of the Application EAP supported types list = A M 3 to (2+A) A Application EAP supported types list M 3+A

41、 1 Application EAP Dedicated file list tag = 81 M 4+A 1 Length of Application EAP Dedicated file list = B M (5+A) to (4+A+B) B Application EAP Dedicated File list M 5+A+B 1 Application EAP Label tag = 82 M 6+A+B 1 Length of the Application EAP Label = C M (7+A+B) to (6+A+B+C) C Application EAP Label

42、 M Coding: Application EAP supported types list: - Contain a list of supported EAP type (as defined in RFC 3748 1) each of them coded in one byte except for expanded types that are coded on 8 bytes. EXAMPLE 1: An UICC application supporting EAP-MD5 (see RFC 3748 1) and EAP-TLS (see RFC 2716 3) provi

43、des the following “Application EAP supported types list“: square4 040Dcorresponding to EAP-MD5 (Type=4) and EAP-TLS (Type=13). Application EAP Dedicated Files list: - Contain a list of file identifiers of each DFEAPassociated to a particular supported EAP type. Each of them coded in two bytes. ETSI

44、ETSI TS 102 310 V9.1.0 (2012-09)9Release 9 EXAMPLE 2: Using the previous example, A DF 6D34 for EAP-MD5 and a DF 6D35 for EAP-TLS will result in the following EAP Dedicated Files list: square4 6D346D35. Application EAP label: - The application label is a DO that contains a string of bytes provided b

45、y the application provider to be shown to the user for information. 5.3 EAP-capable-application selection The terminal shall use the information in EFDIRfile if available to present the list of EAP-capable applications to the user or to any application that may request an EAP authentication. The ter

46、minal shall then select the corresponding EAP-capable-application to start an EAP authentication. Once selected, all EAP-Client state machines of the application are reset. 5.4 Key derivation It is possible for many EAP methods to derive key material after successful authentications. These keys may

47、be used for subsequent processes (e.g. for WEP encryption in IEEE Std 802.11-1999 8). Keys derived from an authentication shall be retrieved by the terminal by inspecting the file EFEAPKEYS. 5.5 Authentication Status The terminal may retrieve the authentication status of the EAP client in the select

48、ed UICC application by inspecting the mandatory file EFEAPSTATUS. 6 EAP related Commands The following clauses specify the additional commands needed to implement the EAP framework in the UICC. 6.1 EAP Authenticate 6.1.1 Command description The function is used to transfer the EAP packets from the t

49、erminal to the selected UICC EAP client (i.e. EAP client in the selected UICC application that corresponds to the given EAP type). The UICC EAP client shall provide a response EAP packet (as defined in RFC 3748 1) or a warning status word according to the authentication method being used. The UICC EAP client shall maintain the state machine of the authentication process as described for the particular EAP method used. The function is related to a particular UICC application supporting

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1