Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method of PHS mobile communication PIM card authentication data

A mobile communication and authentication technology, applied in the field of mobile communication, can solve the problems of low writing authority, easy rewriting and destruction of authentication data, etc., and achieve the effects of reducing the number of maintenance, facilitating promotion, and increasing robustness

Inactive Publication Date: 2008-07-09
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The authentication data of the PIM card is stored in the specified file of the PIM card. At present, the files stored in the authentication data are divided into the above two categories: part of the authentication data stored in the advanced authority file, once the PIM card is manufactured and handed over to the user, General users do not have the ability to rewrite this part of the authentication data; some of the authentication data stored in the general permission file, the write permission of this file is relatively low, and this part of the authentication data is easy to be rewritten and destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method of PHS mobile communication PIM card authentication data
  • Protection method of PHS mobile communication PIM card authentication data
  • Protection method of PHS mobile communication PIM card authentication data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]The method of the present invention is further developed in conjunction with the accompanying drawings and embodiments. First, the main basic points for explaining the inventive method are as follows:

[0050] (1) CRC check:

[0051] ① Write PIM ID and authentication data, where the format of authentication data is as follows figure 1 , write the authentication data into the file. Since this embodiment uses a 32-bit CRC check, the data to be written is grouped by 4 bytes. If it is less than 4 bytes, it will be filled with "0xff", and finally , according to the verification code generation formula "f(x)=

[0052] X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^ 2+X^1+X^0" to get the original check digit and put it in the last byte of each group. The method of writing PIM ID data is the same as the method of writing authentication data.

[0053] ②PIM ID and authentication data verification, the process is as follows figure 2 As shown, the authentication dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting the authority testing data in PIM card which has no relation to mobile device in PHS mobile communication. It also includes: the writing step of special user data and authority testing data when initializes to set the users; the authority testing step when the authority test occurs; the time data examination and restoration step; power-off data examination and data restoration. The method increases a CRC test code in the PIM card file, backups authority test data in PIM card, increases a check and restoration process in the authority test, at the same time, increases a time data examination and restoration and power off data examination and restoration, it can protect the normal authority files in the IPM card from being changed and damaged, it increases the strong property of machine-card separation technology, it guarantees the integrity of authority test data, makes the authority test run smoothly; it reduces the preparation times and reduces the cost.

Description

technical field [0001] The present invention relates to mobile communication, in particular to a PIM card irrelevant to ME equipment in PHS mobile communication, and more specifically to a method for protecting authentication data stored in the PIM card. Background technique [0002] In the PHS mobile communication system, a PIM card that has nothing to do with ME equipment is provided to realize the separation of the machine and the card. The user's authentication data is stored in the PIM card, which is inserted into the PHS mobile phone or fixed station arbitrarily selected by the user; and according to the general RCR STD-28 standard of the existing PHS network, the mobile station will first perform position registration, After the authentication process is successful, the network provides the subscription service for the user. During the process of providing subscription services for the user, the network will require the user to register and authenticate as needed. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/32H04L9/32H04L1/00H04W12/06
Inventor 卢晓辉程琼林强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products