Unlock instant, AI-driven research and patent intelligence for your innovation.

Indentifying method for telecommunication smart card and terminal

An authentication method and smart card technology, which is applied in the field of telecom smart card and terminal authentication, can solve problems such as inability to guarantee

Inactive Publication Date: 2008-10-29
BEIJING WATCH DATA SYST
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no guarantee to prevent unauthorized terminals such as ordinary mobile phones from using telecommunications smart cards for unlimited business calls and wireless public phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Indentifying method for telecommunication smart card and terminal
  • Indentifying method for telecommunication smart card and terminal

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0047] Example 1: Taking the wireless public phone as an example, the processing method of the present invention is as follows:

[0048] First, the authentication algorithm is stored on the smart card, and the same authentication algorithm is also stored in the wireless public phone;

[0049] 1. After the telecom smart card is reset and before the network authentication process is executed, the user authentication information for network authentication will be performed (currently the user authentication information only includes: International Mobile Subscriber Identity (IMSI), user authentication key KeyInformation Referred to as KI, when 3G adds new user authentication information) is changed to false information, modifying user authentication information can change one of them, preferably, change all user authentication information;

[0050] 2. The telecom smart card sends the characteristic word, random number and master key to the terminal through the Getinput command; ...

example 2

[0056] Example 2: Taking the wireless business phone as an example, the processing method of the present invention is as follows:

[0057] First, store the user's authentication information and authentication algorithm on the smart card and also store the same algorithm in the wireless business phone;

[0058] 1. After the telecommunications smart card is reset, before performing the network authentication process, modify the user authentication information (International Mobile Subscriber Identity, user authentication key KI) for network authentication to false information;

[0059] 2. The smart card sends the plaintext and key to the terminal through the Getinkey command;

[0060] 3. After the terminal receives the data transmitted by the smart card, it performs the HASH algorithm on the plaintext, and uses the key to encrypt the result of the HASH algorithm with DES. After adding the plaintext to the obtained encrypted data, it returns to the smart card through the Terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses an authentication method for telecommunication intelligent cards and terminals including: 1, presetting a same algorithm in the intelligent card and an authorized terminal, 2, said card modifies the stored user authentication information to false information after the card is restored and before network authentication, 3, the card and the terminal use the algorithm in step 1, 4, if the authentication is passed, the card recovers the user authentication information to true information, if it fails, the card keeps the current false information.

Description

technical field [0001] The invention relates to the field of data security, in particular to an authentication method for a telecommunication smart card and a terminal. Background technique [0002] In order to cooperate with the village-to-village project and develop customers in rural areas, China Mobile and China Unicom have promoted wireless business phones and wireless public phones across the country. They are charged according to the fixed-line telephone tariff standard. Since this charging standard is cheaper than ordinary mobile phones, it leads to Some people use the form of card theft or card combination, and use the telecom smart cards of wireless business phones and wireless public phones in mobile terminals such as mobile phones, resulting in the loss of a large amount of call charges and interfering with normal tariff policies. However, in the prior art, the wireless network only authenticates and authorizes the telecom smart card, but is helpless for the abov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04W12/06
Inventor 徐达兴郝建梅朱红岩张楚王琳南
Owner BEIJING WATCH DATA SYST