Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of the personal hand-held device system

A handheld and mobile phone technology, applied in the field of PHS systems, can solve the problems of inability to solve the detection problem and the inability to completely prevent user information from being stolen, and achieve the effects of reducing the possibility of stolen numbers, improving security, and simple implementation methods

Inactive Publication Date: 2007-08-01
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The machine-card separation technology reduces the possibility of fraud (meaning that the mobile phone user data is copied by others, and other people's numbers can be stolen to make calls, and others pay), but it cannot solve the detection problem after the user is fraudulent. If the user can Quick detection will reduce user losses and improve security
At the same time, since the PHS authentication algorithm is public, the user authentication KEY remains unchanged. Now there are a large number of signaling analyzers, and the user device KEY may be cracked, so it is still impossible to completely prevent user information from being stolen.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of the personal hand-held device system
  • Authentication method of the personal hand-held device system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] After the machine card is separated, the system cannot connect the user with the fixed mobile phone. In order to realize two authentication algorithms for a user (updating the authentication KEY algorithm and the existing mobile phone authentication method), the system side of the present invention does not make mandatory requirements for updating the authentication KEY. , and the authentication update is initiated by the mobile phone side, which realizes compatibility with existing terminals and supports the processing of authentication KEY requests for new mobile phones.

[0035] The authentication KEY update in this embodiment is implemented by the following two processes:

[0036] 1) The processing flow of the authentication KEY update request initiated by the mobile phone.

[0037] 2) Authentication processing flow.

[0038] The new authentication algorithm authentication request is independent of the call authentication process. The interface of the call authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The PHS system authentication method comprises: requesting system to update the authentication code, generates new codes both on system and phone, and recording the request on system; authenticating the mobile phone by system with current used code, if there is update record on the phone, sending update failure message to the phone when the authentication failing in pass, end; if passing authentication, updating current used code as the new code and sending success message to phone; updating current used code as the new one, end. This invention increases user security.

Description

technical field [0001] The present invention relates to a PHS system (Personal Handy Phone System, also known as a wireless local telephone system in China), in particular to an authentication method of the PHS system. Background technique [0002] PHS (Personal Hahdy Phone System, called wireless local telephone system in China) realizes the security of the system by authenticating the mobile phone, and achieves the purpose of not being able to illegally forge numbers and randomly use mobile phones. [0003] The PHS system provides a set of authentication algorithms to verify the legitimacy of users: HLR (HomeLocation Register, home location register) and PS (Personal Station, mobile phone) configure the same authentication code (KEY) before opening, and the system Issue the authentication random number to instruct the mobile phone to authenticate. The mobile phone uses the KEY and the authentication random number to perform authentication calculation according to the authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W12/06H04W12/126
Inventor 刘绍龙马小飞
Owner ZTE CORP