Authentication method and system of subscriber identity module and terminal

A technology of subscriber identification module and terminal, which is applied in the field of wireless communication, and can solve problems such as the inability to determine the party responsible for the leakage, many parties knowing the key, and key leakage.

Active Publication Date: 2011-06-15
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] (4) There are many parties who know the key, and it is easy to leak the key, and after the key leak occurs, it is impossible to determine the party responsible for the leak;
[0018] (5) When the patch appears, the operator cannot control which users are legal end users and which users are illegal patch users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system of subscriber identity module and terminal
  • Authentication method and system of subscriber identity module and terminal
  • Authentication method and system of subscriber identity module and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Embodiment 1, a method for authenticating a subscriber identity module and a terminal, such as figure 1 shown, including:

[0077] Step S110, when the subscriber identification module determines that the authentication key with the terminal needs to be obtained, send a key update request to the key management system platform, which carries the identity of the subscriber identity module and the identity of the terminal;

[0078] Step S120, after the key management system platform receives the key update request, it generates a message carrying the authentication key according to the identity of the terminal, and determines the transmission key corresponding to the identity of the subscriber identity module; The transmission key and the transmission encryption and decryption algorithm encrypt the message carrying the authentication key and send it to the subscriber identification module;

[0079] Step S130, the subscriber identification module decrypts the message using ...

Embodiment 2

[0190] Embodiment 2, a system for authentication between a user identification module and a terminal, such as Figure 4 As shown, including: subscriber identity module, terminal and key management system platform;

[0191] The user identification module is used to send a key update request to the key management system platform when it is determined that an authentication key with the terminal needs to be obtained, which carries the identification of the user identification module and the identification of the terminal; When receiving the message returned by the key management system platform, use the pre-stored transmission key and the transmission encryption and decryption algorithm to decrypt the message, and obtain the authentication key according to the decrypted message and save it;

[0192] The terminal pre-stores the authentication key, or obtains the authentication key according to the decrypted message of the subscriber identification module; uses the authentication k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and a system of a subscriber identity module and a terminal. The method comprises the following steps: after judging that an authentication key between self and the terminal is required to be obtained, the subscriber identity module sends key updating request to a key management system platform carrying identifiers of the subscriber identity module and the terminal; after receiving the key updating request, the key management system platform generates a message carrying the authentication key according to the identifier of the terminal and determines a transmission key corresponding to the identifier of the subscriber identity module; the transmission key and transmission encryption and decryption algorithm are used for encrypting the messagecarrying the authentication key and then sending the message to the subscriber identity module; the subscriber identity module uses the prestored transmission key and the transmission encryption anddecryption algorithm to decrypt the message and obtains and stores the authentication key according to the decrypted message; the authentication key is prestored in the terminal, or is obtained according to the decrypted message; the subscriber identity module and the terminal use the authentication key and authentication encryption and decryption algorithm for mutual authentication.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a method and system for authenticating a user identification module and a terminal. Background technique [0002] With the development of mobile services, operators have greater discounts on the tariffs for the use of terminals and subscriber identification modules used in some services for the purpose of business promotion. It is necessary to restrict users to use bound dedicated terminals and subscriber identification modules. This kind of dedicated subscriber identity module can't be used on the common mobile phone terminal, as the wireless public telephone service requires public telephone terminal and special-purpose USIM (Universal Subscriber Identity Module, Universal Subscriber Identity Module), SIM (Subscriber Identity Module, Subscriber Identity Module), UIM (User Identity Model, user identification module), EVDO UIM card binding use, mobile reader use mobile termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W12/04H04W12/06H04W12/12H04W12/0431H04W12/069
Inventor 王京阳焦华清穆肇骊郑辉赵大春郭江蕾王长年
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products