Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SIM chip security and credibility authentication system and authentication method thereof

A security authentication and chip technology, applied in security communication devices, transmission systems, digital transmission systems, etc., can solve the problem of inability to effectively prevent SIM chip data leakage from SIM chip network attacks, lack of user authentication of mobile terminal equipment and networks, and threats to equipment and network security issues, to achieve the effect of increasing trusted authentication functions, realizing self-security, and increasing security self-inspection

Pending Publication Date: 2020-05-19
TANGSHAN JINGYUAN YUFENG ELECTRONICS
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the prior art, the SIM chip only supports one-way authentication and does not support two-way authentication.
Even if users can independently access the mobile network through legal authentication, and mobile operators pay more attention to their own information and privacy data protection work, due to the lack of user authentication of mobile terminal equipment and networks, this gives rise to problems such as "pseudo base stations". As a result, criminals will use other people's mobile device numbers or arbitrary numbers to forcibly send spam messages such as fraudulent sales and marketing to users' mobile terminal devices.
Due to the defects of the current SIM card or eSIM protocol, it is currently impossible to effectively prevent the leakage of SIM chip data and effectively defend against network attacks against SIM chips, which seriously threatens the security of devices and networks in the Internet of Things era.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SIM chip security and credibility authentication system and authentication method thereof
  • SIM chip security and credibility authentication system and authentication method thereof
  • SIM chip security and credibility authentication system and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] see figure 1 As shown, it is a structural frame diagram of the SIM chip security and trusted authentication system implemented in the present invention. The SIM chip safe and trusted authentication system includes a microprocessor 100, a security chip 200, a security authentication circuit 300, a digital certificate circuit 400, an algorithm circuit 500 and a SIM chip 600, wherein the microprocessor 100 is connected to the security chip 200, the security authentication circuit 300, the digital certificate circuit 400, the algorithm circuit 500 and the SIM chip 600, the SIM chip 600 is connected to the security chip 200, the security authentication circuit 300, the digital certificate circuit 400 and the algorithm circuit 500 in sequence, and the security chip 200 is connected to the algorithm circuit 500, the algorithm circuit 500 is connected to the digital certificate circuit 400, the digital certificate circuit 400 is connected to the SIM chip 600 and the microproces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an SIM chip security and credibility authentication system and an authentication method thereof. The system comprises a microprocessor, a digital certificate circuit, an algorithm circuit, a security authentication circuit, a security chip and an SIM chip. The microprocessor provides authorization management for the safety chip and the safety certification circuit, the safety chip is added to serve as an independent chip before communication connection is established between the SIM chip and the terminal equipment, and the SIM chip enhances the safety self-checking function of the SIM chip by executing a safety self-checking module in the safety chip. The microprocessor is used for carrying out security and credibility authentication management on the security authentication circuit, so that credibility authentication of the SIM chip on the terminal equipment is realized, and the terminal equipment which does not pass the authentication is refused to be connectedwith the SIM chip. According to the invention, the authorization management and the security and credibility authentication of the SIM chip are realized by adopting an asymmetric cryptography technology, the self-security of the SIM chip is realized from a chip layer by adding the security self-check of the security chip, and a reliable security guarantee is provided for the security communication of the terminal equipment.

Description

technical field [0001] The invention relates to the field of security design of integrated circuits, in particular to a security and credible authentication system and authentication method applicable to a SIM chip. Background technique [0002] SIM card (Subscriber Identification Module), known as subscriber identification card, or SIM smart card, is currently a card that must be equipped or configured in GSM digital mobile phones worldwide. One of the most widely used electronic devices. In the market, there is also a new type of SIM card with embedded technology, that is, eSIM card. The concept of eSIM card is to embed the traditional SIM card directly into the device chip instead of adding it to the device as an independent removable component. Users do not need to insert a physical SIM card, just like the PHS in the early years. This approach will allow users to choose operator packages more flexibly, or change operators at any time without unlocking the device or pur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3263H04L9/3247H04L9/3236H04L9/3234
Inventor 许秋林苏琳琳刘嘉维王琨黄金煌杨会峰
Owner TANGSHAN JINGYUAN YUFENG ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products