Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Improved SIM card and mobile communication identification method and system

A technology of identity recognition and mobile communication, applied in the field of mobile communication, can solve the problem of cracking SIM card confidential communication, etc., and achieve the effect of preventing the risk of being cracked and improving security

Active Publication Date: 2017-11-07
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the Ki in the SIM card is written and fixed when the SIM card leaves the factory. Now there are many ways to crack the Ki. Once the Ki is cracked, the SIM card can be copied in large quantities or its confidential communication is compromised. to crack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved SIM card and mobile communication identification method and system
  • Improved SIM card and mobile communication identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] In the mobile communication identification system based on the improved SIM card in this embodiment, when the customer goes to the mobile communication network to handle network access, the customer is assigned a customer telephone number (MSISDN), an International Mobile Subscriber Identity (IMSI) and a SIM Card. Write the IMSI and other customer information such as various cryptographic algorithms into the customer's SIM card through the card writer.

[0055] A key issuing server is set in the mobile communication network, and a true random number generator is set in the key issuing server, and a specified number of true random number keys are taken out from the true random number generated by the true random number generator. The number key is the true random number key issued this time. And write this true random number key in the SIM card of the customer. The true random number key is directly stored in the SIM card in the form of plain text, and cannot be taken ...

Embodiment 2

[0066] With respect to embodiment 1, the inside of the SIM card in this embodiment is provided with a true random number generator chip, and after the SIM card receives the true random number key from the mobile communication network, it generates A true random number encryption key K, and use the true random number encryption key K to encrypt the true random number key into a true random number key in ciphertext form. The true random number key in the form of cipher text can be stored in the memory of the mobile terminal or the extended storage area of ​​the mobile terminal can also be stored in the data storage area in the SIM card. At the same time, the true random number encryption key K will be saved in the SIM card for use in decryption.

[0067] The following will give the authentication process of the mobile communication network to the client SIM card according to the traditional authentication method, and the authentication process of the client SIM card to the mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an improved SIM card, and a mobile communication identification method and system. The mobile communication identification method based on the improved SIM card, which is disclosed by the invention, is implemented between a mobile communication network and the SIM card mounted in a mobile terminal, and comprises the steps that: one of the mobile communication network and the SIM card utilizes a first authentication key and a random number from an opposite side to generate a first authentication response, and sends the first authentication response to the opposite side; and the opposite side generates a second authentication response by the random number and a second authentication key, and the first authentication response is compared with the second authentication response to carry out identification, wherein the first authentication key and the second authentication key are corresponding true random number keys and are distributed between the mobile communication network and the SIM card in advance. In the invention, an authentication code used when the mobile terminal logs in the mobile communication network every time is generated by the true random number keys shared by the SIM card and the mobile communication network, so that the risk that a Ki key in a conventional SIM card is cracked is effectively prevented.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an improved SIM card and a mobile communication identification method and system. Background technique [0002] When each customer registers in the mobile communication network, he is assigned a customer phone number (MSISDN, Mobile Subscriber International ISDN / PSTN number) and an International Mobile Subscriber Identification Number (IMSI, International Mobile Subscriber Identification Number). The IMSI is written into the customer's SIM card through the SIM card writer, and at the same time, a unique customer authentication key (authentication key) Ki corresponding to the IMSI is generated in the card writer, which is stored in the SIM card. The specific area cannot be read, and it is stored in the authentication center AUC at the same time, which is permanent information. After the customer's mobile phone is turned on, it will read the IMSI from the SIM card. When the mob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04L9/08
CPCH04L9/0869H04W12/04H04W12/06
Inventor 富尧蔡晓宇钟一民
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products