AUTHENTICATION MANAGEMENT METHOD FOR ROAMING IN HETEROGENEOUS WIRELESS NETWORK LINK SYSTEM

An authentication method for roaming in a heterogeneous wireless network interworking system is provided to use information, which has not been used in a previous network, in a new network to which the user has moved, without discarding it. A BC(Base Station)(81) of a new network requests a user ide...

Full description

Saved in:
Bibliographic Details
Main Authors HAN, JIN HEE, CHO, TAE NAM, JUN, SUNG IK
Format Patent
LanguageEnglish
Published 10.06.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An authentication method for roaming in a heterogeneous wireless network interworking system is provided to use information, which has not been used in a previous network, in a new network to which the user has moved, without discarding it. A BC(Base Station)(81) of a new network requests a user identifier from a user terminal(80)(101). The user terminal transmits a roaming request message to the BS(102), and the BS transmits the roaming request message to a VLRn(Visited Location Register n)/SGSNn(Serving GPRS Support Node n) or AAAn(Authentication, Authorization, Accounting) server(82)(103). The VLRn/SGSNn or AAAn server transfers the message to a UAGS(USIM(Universal Subscriber Identity Module) Access Gateway System)(83)(104). The UAGS transmits identification information of the user to an AAAo server or VLRo/SGSNo(84)(105). The AAAo server or VLRo/SGSNo transmits authentication data to the UAGS(83)(106). The UAGS transmits the received information to the VLRn/SGSNn or AAAn server(107). The VLRn/SGSNn or AAAn server calculates an MSK(Master Session Key)(108). The VLRn/SGSNn or AAAn server transmits security key information to the BS(109). The BS stores the received key values(110), creates a key confirmation request message, adds an authentication code MAC1(Message Authentication Code 1) to the key confirmation request message(111) and transmits the same to the user terminal(112). The user terminal checks whether a KSI(Key Set Identifier) of a key confirmation request message received from the BS and its own KSI, and if they are identical, the user terminal verifies the MAC1(113). If the two KSI are identical and the MAC1 is successfully verified, the user terminal generates an authentication code MAC2(114), and transmits a key configuration response message including the MAC2 to the BS(115). When the BS successfully verifies the MAC2, it transmits a roaming success message to the user terminal(117).
Bibliography:Application Number: KR20070075990