TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf

上传人:diecharacter305 文档编号:1060036 上传时间:2019-03-31 格式:PDF 页数:20 大小:246.69KB
下载 相关 举报
TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf_第1页
第1页 / 共20页
TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf_第2页
第2页 / 共20页
TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf_第3页
第3页 / 共20页
TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf_第4页
第4页 / 共20页
TIA-1070-2006 Interoperability Specification (IOS) for Hybrid Mobile Station Access Terminal (HAT) Authentication Using the CAVE Algorithm《使用CAVE算法的混合移动台 接入终端(HAT)鉴权的互操作性规范(IOS)》.pdf_第5页
第5页 / 共20页
点击查看更多>>
资源描述

1、 TIA-1070-2006 APPROVED: AUGUST 1, 2006 REAFFIRMED: MAY 16, 2012 TIA-1070 August 2006Interoperability Specification (IOS) for Hybrid Mobile Station/Access Terminal (HAT) Authentication, Using the CAVE Algorithm NOTICE TIA Engineering Standards and Publications are designed to serve the public intere

2、st through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publ

3、ications shall not in any respect preclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or

4、internationally. Standards and Publications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publ

5、ication. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limita

6、tions before its use. (From Project No. 3-0198, formulated under the cognizance of the TIA TR-45 Mobile (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the

7、 standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consis

8、ting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or

9、validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or rep

10、resent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or

11、 publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or inv

12、estigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Inf

13、ormation as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, insp

14、ect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATE

15、NESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH

16、ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY

17、USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGE

18、NCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. TIA-1070 1 2 3 4 5 6 7 8 9 10 11 12 13 14

19、 15 16 17 18 19 20 Table of Contents Forewordiii 1 Introduction.1-1 1.1 Scope.1-1 1.2 Document Convention 1-1 1.3 Normative References.1-2 1.3.1 3GPP2 .1-2 1.3.2 TIA/EIA1-2 1.3.3 Other .1-2 1.4 Terminology1-3 1.4.1 Acronyms1-3 1.4.2 Definitions 1-3 1.5 Reference Model.1-4 1.6 Assumptions1-4 2 HAT HR

20、PD Network Access Authentication Using the CAVE Algorithm.2-1 2.1 HAT Requirements .2-1 2.2 AN/PCF Requirements .2-1 2.3 Home AN-AAA Requirements.2-1 Annex A Message Exchange ExampleA-1 i TIA-1070 1 2 3 4 5 6 Table of Figures Figure 1.5-1 Reference Architecture for HAT Authentication.1-4 Figure Anne

21、x A-1 HAT Authentication Message FlowA-1 ii TIA-1070 Foreword 1 2 3 4 5 6 7 8 9 10 11 12 13 (This foreword is not part of this specification.) This document was produced by Working Groups TR45.4 of the Telecommunications Industry Associat-ion and TSG-A of the Third Generation Partnership Project 2.

22、This document was developed in accord-ance with TIA/EIA and 3GPP2 procedural guidelines, and represents the consensus position of the Working Groups. Suggestions for improvement of this specification are welcome. They should be sent to: Telecommunications Industry Association Engineering Department

23、Suite 300 250 Wilson Boulevard Arlington, VA 22201 USA iii TIA-1070 1 2 This page intentionally left blank. iv TIA-1070 1 Introduction 1 2 1.1 Scope 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 High Rate Packet Data (HRPD) network access authentication is described in

24、 1 and 2. This document provides alternative procedures that allow a properly configured Hybrid mobile station / Access Terminal (HAT) to use its cdma200011x access network authentication credentials and the Cellular Authenticat-ion and Voice Encryption (CAVE) algorithm (refer to 6) when accessing a

25、n HRPD network that re-quires HRPD network access authentication. Because HRPD network access authentication is optional, it may not be invoked by every HRPD net-work. If it is invoked by an HRPD network, the network initiates the Challenge Handshake Authenticat-ion Protocol (CHAP) 8. In an HRPD net

26、work that complies with 2, CHAP is used between the Access Network (AN) and the HAT. In an HRPD network that complies with 1, CHAP is used between the Packet Control Function (PCF) and the HAT. CHAP specifies that the AN/PCF sends a CHAP Challenge message to the HAT, and the HAT returns a CHAP Respo

27、nse message to the AN/PCF. After receiving the CHAP Response message, the AN/PCF sends both its challenge and the HATs response to its Access Network-Authentication, Authorization, and Accounting (AN-AAA) function. The home AN-AAA authenticates the HAT and returns the results to the AN/PCF. For this

28、 feature of authenticating the HAT by using its cdma2000 1x access network authentication cre-dentials and the CAVE algorithm, the HAT treats the challenge in the CHAP Challenge message as a global random challenge (refer to 3, 4 and 5). When the CHAP challenge message is received, the HAT uses the

29、challenge as input to the Run CAVE function on its Removable User Identity Module (R-UIM) (refer to 3, 4 and 5) and places the result in the CHAP response message. When the home AN-AAA receives the HRPD network access authentication request from the AN/PCF (refer to 1 and 2), it determines if the HA

30、T used cdma2000 1x access network authentication credentials and the CAVE algorithm to create its CHAP response. If the HAT used cdma2000 1x access network authentication credentials and the CAVE algorithm to create the CHAP response, then the home AN-AAA authenticates the HAT using the HATs cdma200

31、0 1x access network authentication credent-ials and the CAVE algorithm. If the home AN-AAA cannot authenticate the HAT independently, it communicates with the Home Location Register / Authentication Center (HLR/AC) to authenticate the HAT. 1.2 Document Convention 31 32 33 34 35 36 37 38 “Shall” and

32、“shall not” identify requirements to be followed strictly to conform to the standard and from which no deviation is permitted. “Should” and “should not” indicate that one of several possibilities is recommended as particularly suitable, without mentioning or excluding others; that a certain course o

33、f action is preferred but not necessarily required; or (in the negative form) that a certain possibility or course of action is discouraged but not prohibited. “May” and “need not” indicate a course of action permissible within the limits of the standard. “Can” and “cannot” are used for statements o

34、f possibility and capability, whether material, physical, or causal. 1cdma2000 is the trademark for the technical nomenclature for certain specifications and standards of the Organizational Partners (OPs) of 3GPP2. Geographically (and as of the date of publication), cdma2000 is a registered trademar

35、k of the Tele-communications Industry Association (TIA-USA) in the United States. 1-1 TIA-1070 1.3 Normative References 1 2 3 4 For ease of cross referencing, the 3GPP2 references references provided in section 1.3.1 are aligned with the Telecommunications Industry Association (TIA) / Electronics In

36、dustry Association (EIA), provided in section 1.3.2. 1.3.1 3GPP2 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 3GPP2 A.S0007-A v2.0, Interoperability Specification (IOS) for High Rate Packet Data (HRPD) Access Network Interfaces - Rev A, May 2003. 2 3GPP2 A.S0008-0 v3.0, Interoperability Specification (IOS

37、) for High Rate Packet Data (HRPD) Access Network Interfaces, May 2003. 3 3GPP2 C.S0023-0 v4.0, Removable User Identity Module for Spread Spectrum Systems, June 2001. 4 3GPP2 C.S0023-A v2.0, Removable User Identity Module for Spread Spectrum Systems, Jan-uary 2004. 5 3GPP2 C.S0023-B v1.0, Removable

38、User Identity Module for Spread Spectrum Systems, May 2004. 6 3GPP2, S.S0053, Common Cryptographic Algorithms, January 2002. 7 3GPP2 X.S0004-E v1.0, Wireless Radiotelecommunications Intersystem Operations, March 2004. 1.3.2 TIA/EIA 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 TIA-1878, Interoperabili

39、ty Specification (IOS) for High Rate Packet Data (HRPD) Access Net-work Interfaces - Alternative Architecture, May 2003. 2 TIA-878-1, Interoperability Specification (IOS) for High Rate Packet Data (HRPD) Access Network Interfaces - Addendum 1, May 2003. 3 TIA/EIA/IS-820-1, Removable User Identity Mo

40、dule (R-UIM) for TIA/EIA Spread Spectrum Systems, Addendum 1, June 2001. 4 TIA-820-A-1, Removable User Identity Module for Spread Spectrum Systems - Addendum 1, April 2004. 5 TIA-820-B, Removable User Identity Module for Spread Spectrum Systems (2004), May 2004. 6 Common Cryptographic Algorithms, Re

41、vision D.1, September 2000. An Export Administration Regulations controlled document subject to restricted distribution. Contact the Telecommuni-cations Industry Association, Arlington, VA. 7 TIA-41-E, Wireless Radiotelecommunications Intersystem Operations, March 2004. 1.3.3 Other 33 34 35 36 37 38

42、 39 40 8 Internet Engineering Task Force RFC 1994, PPP Challenge Handshake Authentication Protocol (CHAP), August 1996. 9 Internet Engineering Task Force RFC 2486, The Network Access Identifier, January 1999. 10 Internet Engineering Task Force RFC 2865, Remote Authentication Dial In User Service (RA

43、DIUS), June 2000. 1-2 TIA-1070 1.4 Terminology 1 2 1.4.1 Acronyms 3 4 5 Acronym Meaning 3GPP2 Third Generation Partnership Project 2 AAA Authentication, Authorization, and Accounting AC Authentication Center AN Access NetworkANSI American National Standards Institute AT Access Terminal AUTHR Authent

44、ication Response AUTHREQ AuthenticationRequest INVOKE (refer to 7) authreq AuthenticationRequest RETURN RESULT (refer to 7) CAVE Cellular Authentication and Voice Encryption CDMA Code Division Multiple Access CHAP Challenge Handshake Authentication Protocol HAT Hybrid MS/AT HLR Home Location Registe

45、r HRPD High Rate Packet Data IMSI International Mobile Subscriber Identity LCP Link Control Protocol MS Mobile StationNAI Network Access Identifier PCF Packet Control Function PPP Point-to-Point Protocol R-UIM Removable User Identity Module TIA Telecommunications Industry Association UATI Unicast Ac

46、cess Terminal Identifier VLR Visitor Location Register 1.4.2 Definitions 6 7 8 9 10 11 12 AN-AAA An entity that performs access authentication and authorizat-ion functions for the HRPD access network. cdma2000 1x access network credentials The set of parameters stored on a R-UIM used to perform ANSI

47、-41 authentication procedures (refer to 3, 4 and 5). Hybrid MS/AT A device capable of operating on both cdma2000 1x and HRPD access networks. 1-3 TIA-1070 1.5 Reference Model 1 2 3 Figure 1.5-1 shows the Architecture Reference Model for a HAT that uses its cdma2000 1x access net-work authentication

48、credentials and algorithm with HRPD network access authentication. 4 5 Figure 1.5-1 Reference Architecture for HAT Authentication 1.6 Assumptions 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 The following assumptions are made regarding HAT and AN/PCF behavior. 1. The operator has configured or use

49、d other implementation specific means to instruct the HAT to use cdma2000 1x access network authentication credentials and the CAVE algorithm when performing HRPD network access authentication. 2. When HRPD network access authentication is invoked, the HAT has an inserted R-UIM that contains cdma2000 1x access network authentication credentials. 3. The home AN-AAA can determine whether or not the HAT is using cdma2000 1x access network authentication credentials and the CAVE algorithm when performing HRPD network

展开阅读全文
相关资源
猜你喜欢
  • DIN EN 50629-2016 Energy performance of large power transformers (Um  36 kV or Sr = 40 MVA) German version EN 50629 2015《大型电力变压器的能量性能 (Um 36 kV或者Sr≥40 MVA) 德文版本EN 50629-2015》.pdf DIN EN 50629-2016 Energy performance of large power transformers (Um 36 kV or Sr = 40 MVA) German version EN 50629 2015《大型电力变压器的能量性能 (Um 36 kV或者Sr≥40 MVA) 德文版本EN 50629-2015》.pdf
  • DIN EN 50667-2017 Information technology - Automated infrastructure management (AIM) systems - Requirements data exchange and applications German version EN 50667 2016《信息技术 自动化基础设施.pdf DIN EN 50667-2017 Information technology - Automated infrastructure management (AIM) systems - Requirements data exchange and applications German version EN 50667 2016《信息技术 自动化基础设施.pdf
  • DIN EN 55012-2010 Vehicles boats and internal combustion engines - Radio disturbance characteristics - Limits and methods of measurement for the protection of off-board receivers (.pdf DIN EN 55012-2010 Vehicles boats and internal combustion engines - Radio disturbance characteristics - Limits and methods of measurement for the protection of off-board receivers (.pdf
  • DIN EN 55016-1-4-2013 Specification for radio disturbance and immunity measuring apparatus and methods - Part 1-4 Radio disturbance and immunity measuring apparatus - Antennas and .pdf DIN EN 55016-1-4-2013 Specification for radio disturbance and immunity measuring apparatus and methods - Part 1-4 Radio disturbance and immunity measuring apparatus - Antennas and .pdf
  • DIN EN 55016-2-1-2014 Specification for radio disturbance and immunity measuring apparatus and methods Part 2-1 Methods of measurement of disturbances and immunity Conducted distur.pdf DIN EN 55016-2-1-2014 Specification for radio disturbance and immunity measuring apparatus and methods Part 2-1 Methods of measurement of disturbances and immunity Conducted distur.pdf
  • DIN EN 55016-2-2-2011 Specification for radio disturbance and immunity measuring apparatus and methods - Part 2-2 Methods of measurement of disturbances and immunity - Measurement .pdf DIN EN 55016-2-2-2011 Specification for radio disturbance and immunity measuring apparatus and methods - Part 2-2 Methods of measurement of disturbances and immunity - Measurement .pdf
  • DIN EN 55016-2-4-2005 Specification for radio disturbance and immunity measuring apparatus and methods - Part 2-4 Methods of measurement of disturbances and immunity - Immunity mea.pdf DIN EN 55016-2-4-2005 Specification for radio disturbance and immunity measuring apparatus and methods - Part 2-4 Methods of measurement of disturbances and immunity - Immunity mea.pdf
  • DIN EN 55020 A11-2012 Sound and television broadcast receivers and associated equipment - Immunity characteristics - Limits and methods of measurement German version EN 55020 2007 .pdf DIN EN 55020 A11-2012 Sound and television broadcast receivers and associated equipment - Immunity characteristics - Limits and methods of measurement German version EN 55020 2007 .pdf
  • DIN EN 55020-2007 Sound and television broadcast receivers and associated equipment - Immunity characteristics - Limits and methods of measurement (IEC CISPR 20 2006) German versio.pdf DIN EN 55020-2007 Sound and television broadcast receivers and associated equipment - Immunity characteristics - Limits and methods of measurement (IEC CISPR 20 2006) German versio.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1