Network access authentication method and its USIM card

A technology of network access and authentication algorithm, applied in the field of network access authentication method and its USIM card, to achieve the effects of low implementation cost, reduced security risk and less changes

Inactive Publication Date: 2008-02-13
DATANG MICROELECTRONICS TECH CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] There are certain security flaws in the authentication mechanism using this shared single permanent key K, because the attacker can intercept the authentication vector (AUTN, RAND) issued by the network and the USIM card response result RES through air interface mo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access authentication method and its USIM card
  • Network access authentication method and its USIM card
  • Network access authentication method and its USIM card

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] First, describe the characteristics of the present invention:

[0050] 1. A specific implementation method of 3G authentication algorithm negotiation and authentication key negotiation based on the existing 3G network access authentication process without adding new signaling or changing the existing authentication protocol is proposed.

[0051] 2. In the process of 3G authentication and resynchronization, the USIM card and the network side can use the default key instead of the negotiated key for resynchronization authentication, thus ensuring complete consistency with the existing VLR / SGSN equipment.

[0052] 3. This solution inherits the original 3G authentication protocol to the greatest extent. This solution only involves upgrading the authentication center AuC and the USIM card, and has no impact on the mobile terminal and other network elements.

[0053] 4. This solution also proposes a security strategy for key negotiation and algorithm negotiation. Operators c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method and a USIM card for internet access, wherein, the USIM card is built in a group of authentication algorithm and authentication algorithm mark list which are the same as the side of the internet. The authentication method comprises: an access authentication requirement is launched by the terminal when the terminal logs in the internet or the position is updated; the side of the terminal and the side of the internet select the same one in a group of authentication algorithm with mutual message and agreement to undergo internet access authentication; the message is an authentication token issued by the side of the internet, the agreement is the corresponding relationship of a special place value of authentication management field in the authentication token and any authentication algorithm in a group of authentication algorithm. The method and the USIM card are based on the existing 3G network access authentication process and do not need to add new signaling or change the existing authentication agreement, with low realization cost; meanwhile, the method and the USIM card reduce the security risk of deciphering authentication key and authentication algorithm compared with the original network access authentication security system with single key and single algorithm.

Description

technical field [0001] The invention relates to the third-generation mobile communication technology, in particular to a network access authentication method supporting key negotiation and algorithm negotiation and a USIM card thereof. Background technique [0002] Network access authentication is an important feature of the third generation mobile communication (referred to as 3G) security system, which is completed by the USIM card on the mobile terminal side, VLR / SGSN and HLR / AuC. Its basic principle is based on the permanent authentication key K shared by the USIM card on the mobile terminal side and the HLR / AuC on the network side. As shown in Figure 1, in the third-generation mobile communication network access authentication process, the authentication is jointly completed by the built-in USIM of the mobile terminal, the network-side VLR / SGSN and HLR / AuC. The permanent authentication key K is respectively preset in the USIM card at the mobile terminal side and the HL...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32H04L9/32H04Q7/38H04W12/0431H04W12/06H04W12/084H04W88/02
Inventor 张志红穆肇骊王建
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products