Check patentability & draft patents in minutes with Patsnap Eureka AI!

Network access authentication method and its USIM card

A technology of network access and authentication algorithm, applied in the field of network access authentication method and its USIM card, to achieve the effect of increasing difficulty, low implementation cost, and enhanced security protection capability

Inactive Publication Date: 2008-02-27
DATANG MICROELECTRONICS TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The authentication mechanism using this shared single permanent key K has certain security flaws, because the attacker can intercept the authentication vector (AUTN, RAND) issued by the network and the USIM card response result RES through air interface monitoring. After obtaining a large number of authentication parameters and response results, the threat of calculating the key K by attacking the algorithm always exists
If there is an accidental disaster where the key K is broken or leaked, the harm will be very serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access authentication method and its USIM card
  • Network access authentication method and its USIM card
  • Network access authentication method and its USIM card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] At first, describe the characteristics of the present invention:

[0051] 1. Propose a specific implementation method of 3G authentication algorithm negotiation and authentication key negotiation based on the existing 3G network access authentication process without adding new signaling or changing the existing authentication protocol

[0052] 2. During the resynchronization process of 3G authentication, the USIM card and the network side can use the default key instead of the negotiated key for resynchronization authentication, thus ensuring complete consistency with the existing VLR / SGSN equipment.

[0053] 3. This scheme inherits the original 3G authentication protocol to the greatest extent. This solution only involves the upgrade of the authentication center AuC and the USIM card, without any impact on the mobile terminal and other network elements.

[0054] 4. This solution also proposes security policies for key negotiation and algorithm negotiation. Operators c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to an authentication method for network access and its USIM card with a set of authentication keys in it same with the network side, in which, the method includes: a terminal starts up an access authentication request when the terminal logs onto the network or updates its position, the terminal side and the network side utilize mutual information and agreement to select same ones in the authentication key to access network authentication, in which, the message is the authentication token sent by the network side and the agreement is the corresponding relation of the special bit value of the authentication management domain and any authentication key in the set of keys, and it's not necessary to increase new signaling or change current authentication protocol to realize low cost based on the current 3G network access authentication process.

Description

technical field [0001] The invention relates to the third-generation mobile communication technology, in particular to a network access authentication method supporting key negotiation and algorithm negotiation and a USIM card thereof. Background technique [0002] Network access authentication is an important feature of the third generation mobile communication (referred to as 3G) security system, which is completed by the USIM card on the mobile terminal side, VLR / SGSN and HLR / AuC. Its basic principle is based on the permanent authentication key K shared by the USIM card on the mobile terminal side and the HLR / AuC on the network side. As shown in Figure 1, in the third-generation mobile communication network access authentication process, the authentication is jointly completed by the built-in USIM of the mobile terminal, the network-side VLR / SGSN and HLR / AuC. The permanent authentication key K is respectively preset in the USIM card at the mobile terminal side and the HL...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L29/06H04L9/32G06K19/07H04W12/0431H04W12/06H04W48/08
Inventor 张志红穆肇骊王建
Owner DATANG MICROELECTRONICS TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More