Method for a secure detach procedure in a radio telecommunications network

ABSTRACT

The present invention proposes a method for performing a detach of a terminal registered to a telecommunication network by associating an identification for said terminal, deriving a signature for said identification, and allocating a pair consisting of said identification and said signature to said terminal, said method comprising the steps of: sending a detach request including said identification and said identification signature from said registered terminal to said network; receiving said detach request at the network side; comparing said received detach request with a record of registration data of said terminal kept at the network side; and detaching said terminal from said network, if said received detach request coincides with said record of registration data.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority of U.S. patent application Ser. No.09/627,684, filed on Jul. 28, 2000, which is a continuation ofInternational Application PCT/EP98/08064, filed on Dec. 10, 1998. Thesubject matter of these earlier filed applications is herebyincorporated by reference.

FIELD OF THE INVENTION

The present invention relates to a method for performing a secure detachprocedure in a radio telecommunication network, in particular in aso-called third generation network. Moreover, the present inventionrelates to a corresponding registration procedure for registering asubscriber to such a telecommunication network. Also, the presentinvention relates to corresponding devices of subscriber terminals andnetwork controlling devices which are adapted to carry out thesemethods, and to a correspondingly adapted telecommunication network.

BACKGROUND OF THE INVENTION

In hitherto known telecommunication networks, a subscriber terminal as afirst type radio transceiver device (hereinafter: mobile station MS), inorder to be operated within a network, needs to be registered to thenetwork NW, i.e. to a network controlling device like for example amobile services switching center MSC (or an SGSN), which controls socalled base station controllers BSC, which in turn control base stationsBS as second type radio transceiver devices.

To this end, each subscriber has a subscriber identity module SIM to beinserted into the used mobile station MS as a respective terminalequipment. The SIM contains a pre-stored international mobile subscriberidentity number IMSI, by which a user can be identified. However, inorder to protect the user against being identified by an intruder in thenetwork, each user is assigned a temporary mobile subscriber identityTMSI. This identification which changes either from time to time or fromarea to area (when combined with a location area identifier LAI) allowsan “anonymous” identification of the user when using his terminal.

For details of the roughly described registration procedure includingciphering of transmitted data for authentication at registration, whichdetails are considered to be not necessarily to be described here, thereader is referred to the plurality of respective publicly available GSMspecifications.

Likewise, an attached or registered subscriber or mobile station,respectively, will have to perform a detach from the network underspecific conditions. For example, the mobile station will be detachedfrom the network and its registration will be abandoned, in case the SIMmodule is detached from the terminal equipment or the like.

In such cases, the mobile station MS sends a detach message to thenetwork NW, the so-called IMSI DETACH INDICATION message. Upon receiptof the IMSI DETACH INDICATION the network controlling device (MSC) setsan inactive indication for the mobile station MS, while no response isreturned to the mobile station itself. (For details, also in thiscontext it is referred to the respective GSM specifications). Namely, noauthentication is conducted at detach, when the mobile stationinitiating the detach procedure leaves the network.

Thus, there exists a possibility that a malicious user may obstruct oreven terminate a third party's call by sending detach messages withrandom identities of mobile stations (i.e. random numbers of TMSIidentifiers). Stated in other words, although it is not possible tointerrupt the connection to a specific mobile station MS of a certainspecified user by sending such a detach message, a lot of damage andirritation can be caused to a great number of users as well as to theoperator of the network NW, when arbitrary calls and/or radioconnections are blocked and/or terminated by the intention of amalicious third party.

A previously proposed approach to prevent this resides in performing anauthentication procedure when a mobile station MS is to be detached fromthe network NW, i.e. upon receipt of a detach message at the networkfrom the mobile station.

However, such a proposed authentication at detach is rather timeconsuming in many situations and has therefore only a limitedapplicability.

Moreover, performing an authentication procedure may not be feasible ifthe mobile station is performing power off, i.e. is switched off, or theavailable battery power is too low so that normal operation of themobile station can not be assured any longer.

SUMMARY OF THE INVENTION

Hence, it is an object of the present invention to provide a simple anduseful method for performing a detach from and/or a corresponding methodfor registration to a network, which prevent the above describedproblems.

According to the present invention, this object is achieved by a methodfor performing a detach of a terminal registered to a telecommunicationnetwork by associating an identification for said terminal, deriving asignature for said identification, and allocating a pair consisting ofsaid identification and said signature to said terminal, said methodcomprising the steps of: sending a detach request including saididentification and said identification signature from said registeredterminal to said network; receiving said detach request at the networkside; comparing said received detach request with a record ofregistration data of said terminal kept at the network side; anddetaching said terminal from said network, if said received detachrequest coincides with said record of registration data.

According to the present invention, this object is furthermore achievedby a method for registration of a terminal to a telecommunicationnetwork, said method comprising the steps of: associating anidentification for said terminal, deriving a signature for saididentification, and allocating a pair consisting of said identificationand said signature to said terminal.

Favorable refinements of the present invention are as defined in therespective dependent claims.

Thus, the present invention provides the advantage that a simple anduseful method is available for preventing a malicious' user to interruptthird party's calls by sending detach messages with random identities ofmobile stations.

In particular, the proposed method enables an immediate authenticationof the mobile station requesting a detach procedure upon receipt of thedetach request message or the detach request, respectively. Thisauthentication procedure is not time consuming and also applicable incase of a mobile station being switched off (entering the power offstate) or having a battery level which is too low for normal operationof the mobile station. Thus, even in such situations, the detachprocedure may be carried out correctly.

Moreover, due to the fact that the detach request is composed of theidentifier as well as the identifier signature, the proposed immediateauthentication process is highly secure, because in practice it isimpossible to find such a matching pair by just taking two arbitrarynumbers.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be more readily understood with reference tothe accompanying drawings, in which:

FIG. 1 shows a flowchart of the registration procedure according to thepresent invention;

FIG. 2 shows a flowchart of the detach procedure according to thepresent invention; and

FIG. 3 shows a schematic representation of the data format used for thedetach request or detach request message, respectively, according to thepresent invention.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

According to the present invention, when a mobile station MS as a firsttype radio transceiver station or, in general, a terminal is registeredto a network NW like for example a so-called third generation radiotelecommunication network, i.e. registered to the network controllingdevice MSC, it sends an attach/registration request (formed by one ormore request messages), or dependent on the specific situation, alocation update request to the network NW. A request as such (to bevalid for being evaluated) may be composed of more than one transmittedmessages.

The network NW, which for the present description is assumed to berepresented by the network controlling device as for example an MSC, inturn associates an identification to the mobile station MS. Associatingsuch an identification may be achieved in that the network NW allocatesan identification to the terminal MS

The identification may be represented by the temporary mobile subscriberidentity TMSI. Alternatively, as the identification also theinternational mobile subscriber identity IMSI could be used. In general,any suitable identification may be used for identifying a respectivemobile terminal MS, and the present invention is not restricted to theuse of the TMSI or the IMSI as identifications.

Additionally, the network NW allocates a signature (e.g. TMSI signatureTMSI_SIG) corresponding to the identification and derived therefor onthe basis of, for example, a coding algorithm like an algorithm known asthe “Pretty Good Privacy” (PGP) algorithm, to the terminal, i.e. themobile station MS. However, the deriving of the signature for and/or ofthe identification is not limited to the network side. Namely,alternatively, also the terminal MS may derive a signature for theidentification by way of calculation. In this connection, information asto which algorithm for calculating the signature is to be chosen is insuch a case exchanged between the network NW and the terminal MS. Afterhaving thus derived the signature, the deriving side (i.e. NW or MS)informs the other side of the derived signature.

Both data items, the identification TMSI as well as the identificationsignature TMSI_SIG are allocated to the mobile station MS in a securemode, so that it is impossible for any other mobile station or any otherthird party to know the pair of these data items TMSI, TMSI_SIG. Ofcourse, if in the above mentioned example case the terminal MS derivesthe signature, the derived signature is informed to the network NW in asecure mode, to be securely associated to the identification, so that itis impossible for any other mobile station or any other third party toknow the pair of these data items TMSI, TMSI_SIG.

In particular, according to the present invention, the network NW or thenetwork controlling device MSC, respectively, associates and/orallocates also a signature TMSI_SIG in—combination with the identifierTMSI itself to the mobile station MS. Moreover, according to the presentinvention, the associated signature is used together with the identifierin a detach procedure, as described below.

Namely, in case the mobile station MS leaves the network NW and is to bedetached therefrom due to, e.g., switching off the mobile station MS ora low battery charging state at the mobile station's side or a removaland/or taking off a SIM card (subscriber identity module) as examplesfor a respective predetermined detach condition for the mobile station,a detach procedure according to the present invention is performed. Inparticular, in this detach procedure, the mobile station MS whenrequesting and/or initiating detach, sends a detach request to thenetwork NW. The detach request contains the identification TMSI and theidentification signature TMSI_SIG as a pair of data items. The networkcompares the received two data items which identify the requestingmobile station with the previously allocated one's. If the comparisonyields that the received data items are identical to the previouslyallocated one's, the detach is performed correctly at the network side.Because no other mobile station MS except the one to which theidentifier signature and corresponding identifier were previouslyallocated to, knows the pair of data items, it is impossible for othermobile stations to perform a malicious detach procedure.

The following description of the drawings will set out the operation ofthe present invention in greater detail.

FIG. 1 shows a flowchart of the registration procedure. In step S0 theregistration procedure starts. In the subsequent step S1, it is checkedat the mobile station MS side, whether a registration condition ispresent. Such a registration condition may for example be present whensaid mobile station newly attaches to a network NW and has initially tobe registered (authenticated) at the network NW side, or when saidmobile station has moved within the network NW and a location update ofsaid mobile station MS becomes necessary. Alternatively, also a cellupdate in case of the terminal having moved to an extent that theprevious cell has been left and a new cell was entered represents such aregistration condition. Also, in third generation networks an URA (UTRANRegistration Area, UTRAN standing for “Universal Terrestrial RadioAccess Network”) update is possible, thus representing a registrationcondition in the sense of the present invention. Such an URA update maybe necessary in case of third generation networks, in which a radionetwork controller RNC handles the location information in terms ofregistration areas. Such updates become for example necessary when themobile station has to be registered to another controlling device MSCwithin the network due to “excessive” moving within the network and/orin case of a request of the mobile station MS for a traffic channelassignment.

If no registration condition is present in step S1, the procedurereturns to step S1 until a registration condition is present. Then, theprocess proceeds to step S2.

In step S2, the mobile station MS sends a registration request REG_REQto the network NW, i.e. to the network controlling device, e.g. the MSC.The registration request REG_REQ is for example an attach request forinitial registration of said mobile station MS as a first type radiotransceiver device in said network, or a location update request forupdating a previous registration of said mobile station MS in saidnetwork, or any other request which is transmitted when any of the abovedescribed further possible registration conditions is satisfied.

In step S3, this registration request REG_REQ is received by the networkcontrolling device. In response to receiving said request, the networkcontrolling device selects or determines an identification like forexample TMSI for the requesting mobile station MS.

Moreover, in a subsequent step S4 of the described example, the networkNW (network controlling device MSC) also derives an identificationsignature TMSI_SIG for said identification TMSI. (However, as mentionedabove, the signature may also be derived by the mobile station MS itselfupon receipt of a corresponding instruction from the network NW, and thesignature will then have to be informed to the network NW (notrepresented in the figures).)

Both of these data items as parameters for identifying a specific mobilestation MS, namely, the identification TMSI and the (separate)identification signature TMSI_SIG are allocated to the mobile station MSin a subsequent step S5. Of course, the network NW keeps a record of thethus assigned pair of data items.

The data items TMSI and TMSI_SIG are allocated in a secure mode, so thata third party may not obtain a knowledge of the assigned data items.Then, in step S6 of the described example, they are transmitted from thenetwork NW side to the mobile station MS side in order to inform themobile station of the allocated identification TMSI and theidentification signature TMSI_SIG.

Thereafter, in step S7, the registration procedure is completed.

FIG. 2 illustrates a flowchart of the detach procedure when a mobilestation MS as a terminal is to be detached from the network it haspreviously been registered to.

The detach procedure starts in a step S8. In a subsequent step S9, at arespective mobile station MS side, it is checked whether a predeterminedcondition, i.e. a detach condition, of the mobile station MS is present.Such a detach condition may for example be met in case of a power offstate of said mobile station MS, or in case a low battery charging stateof the battery of the mobile station is detected. Alternatively, a useractuated command may fulfill the detach condition, for example, ifanother user wishes to use the mobile station MS as a terminal equipmentand an SIM module (subscriber identity module) of the new user has to beinserted. This applies also in case of removal of the SIM module.

If no such detach condition as a predetermined condition is detected,the procedure loops until a corresponding condition is detected. If adetach condition is detected at the mobile station side, the mobilestation MS sends a detach request DET_REQ to the network NW, i.e. to thenetwork controlling device like an MSC, step S10.

The detach request DET_REQ contains said pair of said identificationTMSI and said identification signature TMSI_SIG previously allocated tosaid mobile station MS upon registration of the mobile station to thenetwork NW.

In particular, the detach request DET_REQ, may for example, assume adata format as shown in FIG. 3 of the drawings. As roughly schematicallyillustrated therein, a burst transmitted from the mobile station MS tothe network NW (controlling device) contains the detach request DET_REQ.The detach request contains the pair of the identification TMSI and theidentification signature TMSI_SIG. Although the TMSI and TMSI_SIG areillustrated as being transmitted immediately one after the other in theburst, another burst format may be adopted in that there may be provideda guard period or dummy period (not shown) between the respective dataitems. Alternatively, each data item could be identified by a respectiveflag (not shown) indicating which data item is transmitted next, andtransmitted prior to the respective data item. Moreover, in the lattercase, the order of the specific transmitted data items would not berestricted to a specific one, but could be changed in an arbitrarymanner, as long as the data items could be identified at the receptionside. Furthermore, the detach request could be transmitted in a formsuch that for example, the identification and the identificationsignature could be transmitted in consecutive bursts as respectiverequest messages which in combination result in the request as such.

In step S11, the detach request DET_REQ is received at the network NWside. In a following step S12, the received detach request DET_REQ iscompared, data item per data item, i.e. separately for theidentification TMSI and the identification signature TMSI_SIG, with arecord of registration data of said terminal kept at the network side.The record is the record of the previously assigned pair of data itemsTMSI, TMSI_SIG kept at the network NW side, as mentioned above inconnection with step S5, upon registration of a respective mobilestation MS to the network NW.

Namely, at the network controller side a set of such records (e.g. inform of a table) of all allocated pairs of data items TMSI, TMSI_SIG forall respective mobile stations currently registered to the network iskept, and in step S12 a check is made as to whether the received pair ofTMSI, TMSI_SIG is contained as a record in said set of records (table).

If the pair of data items received with the detach request messageDET_REQ is not contained in said record (NO in step S12), the procedureadvances to step S13. In step S13, no detach operation is performed, andall registered mobile stations remain registered to the network. Also,an authentication procedure (registration) could then be started in thiscase in step S13. Therefore, a malicious user sending arbitraryidentifications can not terminate any call or detach any other user,since he is not enabled to send a pair of matching data items of anidentification TMSI and a corresponding identification signatureTMSI_SIG.

If, however, the comparison in step S12 yields that the received detachrequest DET_REQ contains a pair of data items TMSI, TMSI_SIG which iscontained in the table of records, i.e. has previously been allocated toa mobile station upon registration, (YES in step S12) then the flowproceeds to step S14.

In step S14, a detach operation is performed, since it has been verifiedthat the detach request DET_REQ originated from an authentic mobilestation which was previously registered to the network. Thus, animmediate authentication procedure can be carried out by comparing thepair of received data item TMSI, TMSI_SIG with a record of previouslyallocated (assigned) data items. This assures that a detach operation isonly performed for a mobile station MS as a respective terminal, if therequest for detach originates from the mobile station MS itself. Hence,no malicious user can initiate a detach of arbitrary mobile stationssince he can not know the pair of the identification TMSI and thecorresponding signature TMSI_SIG.

Moreover, the authentication at detach is immediately effected at thenetwork side without involving a repeated handshaking procedure with themobile station. Thus, the authentication procedure can also besuccessfully performed in case the mobile station has a too low batterycharging level, has been switched off, or the like.

The procedure has been described herein above mainly with reference tothe temporary mobile subscriber identity TMSI being used as anidentification and for deriving the signature therefor, since the TMSIis already defined in existing radio telecommunication systems and,therefore, can be advantageously be used in connection with the presentinvention. Nevertheless, the present invention can also be carried outin case a new identification and corresponding signature thereof aredefined, while this, however, would require additional changes toexisting agreed standards.

It should be understood that the above description and accompanyingdrawings are only intending to illustrate the present invention by wayof example. Thus, the preferred embodiment of the invention may varywithin the scope of the attached claims.

1.-12. (canceled)
 13. An apparatus comprising: a wireless terminalcomprising: a transceiver adapted to receive a signature from a networkcontrolling device and to send a detach request including anidentification and the signature from the wireless terminal to thenetwork controlling device in response to detection of a predeterminedstate of the wireless terminal, wherein the wireless terminal is adaptedto perform a detach of the wireless terminal when registered to atelecommunication network by at least associating the identification ofthe wireless terminal with the signature, the signature derived by thenetwork controlling device, and a pair containing the identification andthe signature is allocated to the wireless terminal by the networkcontrolling device.
 14. The apparatus according to claim 13, wherein theidentification is a temporary mobile subscriber identity.
 15. Theapparatus according to claim 13, wherein the identification is aninternational mobile subscriber identity.
 16. An apparatus comprising: anetwork controlling device comprising: a receiver adapted to receive adetach request including an identification and a signature from awireless terminal, the detach request sent from the wireless terminal inresponse to detection of a predetermined state of the wireless terminal;a controller adapted to compare the received detach request with arecord of registration data of the wireless terminal kept at the networkside, and to detach the wireless terminal from the network when thereceived detach request coincides with the record of registration data,wherein the record of registration data including a pair includes theidentification and the signature, and wherein the controller is adaptedto effect the comparison for each of the items included in the pair,wherein the network controlling device derives the signature, thenetwork controlling device configured to perform a detach of thewireless terminal registered to a telecommunication network byassociating the identification for the wireless terminal with thesignature, and allocating the pair containing the identification and thesignature to the wireless terminal.
 17. The apparatus according to claim16, wherein the identification is a temporary mobile subscriberidentity.
 18. The apparatus according to claim 16, wherein theidentification is an international mobile subscriber identity.
 19. Theapparatus of claim 16, wherein prior to the wireless terminal sendingthe detach request, the network controlling device sends theidentification signature to the wireless terminal.
 20. A systemcomprising: at least one wireless terminal configured to perform adetach of the wireless terminal when registered to a telecommunicationnetwork by associating an identification for the terminal, and asignature for the identification, and allocating a pair containing theidentification and the signature to the wireless terminal, the wirelessterminal comprising a transceiver adapted to send a detach requestincluding the identification and the identification signature from thewireless terminal to the network in response to detection of apredetermined state of the wireless terminal; and at least one networkcontrolling device controlling at least one radio transceiver device,wherein the at least one network controlling device comprises a receiveradapted to receive a detach request including the identification and theidentification signature from the registered wireless terminal, and acontroller adapted to compare the received detach request with a recordof registration data of the wireless terminal kept at the network sideand to detach the wireless terminal from the network when the receiveddetach request coincides with the record of registration data, whereinthe network controlling device derives the signature.