1、 TIA-1070-2006 APPROVED: AUGUST 1, 2006 REAFFIRMED: MAY 16, 2012 TIA-1070 August 2006Interoperability Specification (IOS) for Hybrid Mobile Station/Access Terminal (HAT) Authentication, Using the CAVE Algorithm NOTICE TIA Engineering Standards and Publications are designed to serve the public intere
2、st through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publ
3、ications shall not in any respect preclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or
4、internationally. Standards and Publications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publ
5、ication. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limita
6、tions before its use. (From Project No. 3-0198, formulated under the cognizance of the TIA TR-45 Mobile (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the
7、 standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consis
8、ting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or
9、validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or rep
10、resent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or
11、 publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or inv
12、estigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Inf
13、ormation as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, insp
14、ect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATE
15、NESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH
16、ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY
17、USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGE
18、NCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. TIA-1070 1 2 3 4 5 6 7 8 9 10 11 12 13 14
19、 15 16 17 18 19 20 Table of Contents Forewordiii 1 Introduction.1-1 1.1 Scope.1-1 1.2 Document Convention 1-1 1.3 Normative References.1-2 1.3.1 3GPP2 .1-2 1.3.2 TIA/EIA1-2 1.3.3 Other .1-2 1.4 Terminology1-3 1.4.1 Acronyms1-3 1.4.2 Definitions 1-3 1.5 Reference Model.1-4 1.6 Assumptions1-4 2 HAT HR
20、PD Network Access Authentication Using the CAVE Algorithm.2-1 2.1 HAT Requirements .2-1 2.2 AN/PCF Requirements .2-1 2.3 Home AN-AAA Requirements.2-1 Annex A Message Exchange ExampleA-1 i TIA-1070 1 2 3 4 5 6 Table of Figures Figure 1.5-1 Reference Architecture for HAT Authentication.1-4 Figure Anne
21、x A-1 HAT Authentication Message FlowA-1 ii TIA-1070 Foreword 1 2 3 4 5 6 7 8 9 10 11 12 13 (This foreword is not part of this specification.) This document was produced by Working Groups TR45.4 of the Telecommunications Industry Associat-ion and TSG-A of the Third Generation Partnership Project 2.
22、This document was developed in accord-ance with TIA/EIA and 3GPP2 procedural guidelines, and represents the consensus position of the Working Groups. Suggestions for improvement of this specification are welcome. They should be sent to: Telecommunications Industry Association Engineering Department
23、Suite 300 250 Wilson Boulevard Arlington, VA 22201 USA iii TIA-1070 1 2 This page intentionally left blank. iv TIA-1070 1 Introduction 1 2 1.1 Scope 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 High Rate Packet Data (HRPD) network access authentication is described in
24、 1 and 2. This document provides alternative procedures that allow a properly configured Hybrid mobile station / Access Terminal (HAT) to use its cdma200011x access network authentication credentials and the Cellular Authenticat-ion and Voice Encryption (CAVE) algorithm (refer to 6) when accessing a
25、n HRPD network that re-quires HRPD network access authentication. Because HRPD network access authentication is optional, it may not be invoked by every HRPD net-work. If it is invoked by an HRPD network, the network initiates the Challenge Handshake Authenticat-ion Protocol (CHAP) 8. In an HRPD net
26、work that complies with 2, CHAP is used between the Access Network (AN) and the HAT. In an HRPD network that complies with 1, CHAP is used between the Packet Control Function (PCF) and the HAT. CHAP specifies that the AN/PCF sends a CHAP Challenge message to the HAT, and the HAT returns a CHAP Respo
27、nse message to the AN/PCF. After receiving the CHAP Response message, the AN/PCF sends both its challenge and the HATs response to its Access Network-Authentication, Authorization, and Accounting (AN-AAA) function. The home AN-AAA authenticates the HAT and returns the results to the AN/PCF. For this
28、 feature of authenticating the HAT by using its cdma2000 1x access network authentication cre-dentials and the CAVE algorithm, the HAT treats the challenge in the CHAP Challenge message as a global random challenge (refer to 3, 4 and 5). When the CHAP challenge message is received, the HAT uses the
29、challenge as input to the Run CAVE function on its Removable User Identity Module (R-UIM) (refer to 3, 4 and 5) and places the result in the CHAP response message. When the home AN-AAA receives the HRPD network access authentication request from the AN/PCF (refer to 1 and 2), it determines if the HA
30、T used cdma2000 1x access network authentication credentials and the CAVE algorithm to create its CHAP response. If the HAT used cdma2000 1x access network authentication credentials and the CAVE algorithm to create the CHAP response, then the home AN-AAA authenticates the HAT using the HATs cdma200
31、0 1x access network authentication credent-ials and the CAVE algorithm. If the home AN-AAA cannot authenticate the HAT independently, it communicates with the Home Location Register / Authentication Center (HLR/AC) to authenticate the HAT. 1.2 Document Convention 31 32 33 34 35 36 37 38 “Shall” and
32、“shall not” identify requirements to be followed strictly to conform to the standard and from which no deviation is permitted. “Should” and “should not” indicate that one of several possibilities is recommended as particularly suitable, without mentioning or excluding others; that a certain course o
33、f action is preferred but not necessarily required; or (in the negative form) that a certain possibility or course of action is discouraged but not prohibited. “May” and “need not” indicate a course of action permissible within the limits of the standard. “Can” and “cannot” are used for statements o
34、f possibility and capability, whether material, physical, or causal. 1cdma2000 is the trademark for the technical nomenclature for certain specifications and standards of the Organizational Partners (OPs) of 3GPP2. Geographically (and as of the date of publication), cdma2000 is a registered trademar
35、k of the Tele-communications Industry Association (TIA-USA) in the United States. 1-1 TIA-1070 1.3 Normative References 1 2 3 4 For ease of cross referencing, the 3GPP2 references references provided in section 1.3.1 are aligned with the Telecommunications Industry Association (TIA) / Electronics In
36、dustry Association (EIA), provided in section 1.3.2. 1.3.1 3GPP2 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1 3GPP2 A.S0007-A v2.0, Interoperability Specification (IOS) for High Rate Packet Data (HRPD) Access Network Interfaces - Rev A, May 2003. 2 3GPP2 A.S0008-0 v3.0, Interoperability Specification (IOS
37、) for High Rate Packet Data (HRPD) Access Network Interfaces, May 2003. 3 3GPP2 C.S0023-0 v4.0, Removable User Identity Module for Spread Spectrum Systems, June 2001. 4 3GPP2 C.S0023-A v2.0, Removable User Identity Module for Spread Spectrum Systems, Jan-uary 2004. 5 3GPP2 C.S0023-B v1.0, Removable
38、User Identity Module for Spread Spectrum Systems, May 2004. 6 3GPP2, S.S0053, Common Cryptographic Algorithms, January 2002. 7 3GPP2 X.S0004-E v1.0, Wireless Radiotelecommunications Intersystem Operations, March 2004. 1.3.2 TIA/EIA 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 TIA-1878, Interoperabili
39、ty Specification (IOS) for High Rate Packet Data (HRPD) Access Net-work Interfaces - Alternative Architecture, May 2003. 2 TIA-878-1, Interoperability Specification (IOS) for High Rate Packet Data (HRPD) Access Network Interfaces - Addendum 1, May 2003. 3 TIA/EIA/IS-820-1, Removable User Identity Mo
40、dule (R-UIM) for TIA/EIA Spread Spectrum Systems, Addendum 1, June 2001. 4 TIA-820-A-1, Removable User Identity Module for Spread Spectrum Systems - Addendum 1, April 2004. 5 TIA-820-B, Removable User Identity Module for Spread Spectrum Systems (2004), May 2004. 6 Common Cryptographic Algorithms, Re
41、vision D.1, September 2000. An Export Administration Regulations controlled document subject to restricted distribution. Contact the Telecommuni-cations Industry Association, Arlington, VA. 7 TIA-41-E, Wireless Radiotelecommunications Intersystem Operations, March 2004. 1.3.3 Other 33 34 35 36 37 38
42、 39 40 8 Internet Engineering Task Force RFC 1994, PPP Challenge Handshake Authentication Protocol (CHAP), August 1996. 9 Internet Engineering Task Force RFC 2486, The Network Access Identifier, January 1999. 10 Internet Engineering Task Force RFC 2865, Remote Authentication Dial In User Service (RA
43、DIUS), June 2000. 1-2 TIA-1070 1.4 Terminology 1 2 1.4.1 Acronyms 3 4 5 Acronym Meaning 3GPP2 Third Generation Partnership Project 2 AAA Authentication, Authorization, and Accounting AC Authentication Center AN Access NetworkANSI American National Standards Institute AT Access Terminal AUTHR Authent
44、ication Response AUTHREQ AuthenticationRequest INVOKE (refer to 7) authreq AuthenticationRequest RETURN RESULT (refer to 7) CAVE Cellular Authentication and Voice Encryption CDMA Code Division Multiple Access CHAP Challenge Handshake Authentication Protocol HAT Hybrid MS/AT HLR Home Location Registe
45、r HRPD High Rate Packet Data IMSI International Mobile Subscriber Identity LCP Link Control Protocol MS Mobile StationNAI Network Access Identifier PCF Packet Control Function PPP Point-to-Point Protocol R-UIM Removable User Identity Module TIA Telecommunications Industry Association UATI Unicast Ac
46、cess Terminal Identifier VLR Visitor Location Register 1.4.2 Definitions 6 7 8 9 10 11 12 AN-AAA An entity that performs access authentication and authorizat-ion functions for the HRPD access network. cdma2000 1x access network credentials The set of parameters stored on a R-UIM used to perform ANSI
47、-41 authentication procedures (refer to 3, 4 and 5). Hybrid MS/AT A device capable of operating on both cdma2000 1x and HRPD access networks. 1-3 TIA-1070 1.5 Reference Model 1 2 3 Figure 1.5-1 shows the Architecture Reference Model for a HAT that uses its cdma2000 1x access net-work authentication
48、credentials and algorithm with HRPD network access authentication. 4 5 Figure 1.5-1 Reference Architecture for HAT Authentication 1.6 Assumptions 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 The following assumptions are made regarding HAT and AN/PCF behavior. 1. The operator has configured or use
49、d other implementation specific means to instruct the HAT to use cdma2000 1x access network authentication credentials and the CAVE algorithm when performing HRPD network access authentication. 2. When HRPD network access authentication is invoked, the HAT has an inserted R-UIM that contains cdma2000 1x access network authentication credentials. 3. The home AN-AAA can determine whether or not the HAT is using cdma2000 1x access network authentication credentials and the CAVE algorithm when performing HRPD network