Indentifying method for telecommunication smart card and terminal
An authentication method and smart card technology, which is applied in the field of telecom smart card and terminal authentication, can solve problems such as inability to guarantee
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0047] Example 1: Taking the wireless public phone as an example, the processing method of the present invention is as follows:
[0048] First, the authentication algorithm is stored on the smart card, and the same authentication algorithm is also stored in the wireless public phone;
[0049] 1. After the telecom smart card is reset and before the network authentication process is executed, the user authentication information for network authentication will be performed (currently the user authentication information only includes: International Mobile Subscriber Identity (IMSI), user authentication key KeyInformation Referred to as KI, when 3G adds new user authentication information) is changed to false information, modifying user authentication information can change one of them, preferably, change all user authentication information;
[0050] 2. The telecom smart card sends the characteristic word, random number and master key to the terminal through the Getinput command; ...
example 2
[0056] Example 2: Taking the wireless business phone as an example, the processing method of the present invention is as follows:
[0057] First, store the user's authentication information and authentication algorithm on the smart card and also store the same algorithm in the wireless business phone;
[0058] 1. After the telecommunications smart card is reset, before performing the network authentication process, modify the user authentication information (International Mobile Subscriber Identity, user authentication key KI) for network authentication to false information;
[0059] 2. The smart card sends the plaintext and key to the terminal through the Getinkey command;
[0060] 3. After the terminal receives the data transmitted by the smart card, it performs the HASH algorithm on the plaintext, and uses the key to encrypt the result of the HASH algorithm with DES. After adding the plaintext to the obtained encrypted data, it returns to the smart card through the Terminal...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 