System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system

A terminal authentication and terminal technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of no f1-f5 function, quintuple parameter calculation, and terminal authentication network, etc.

Inactive Publication Date: 2008-04-16
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the 2G SIM card used is only A3 in the 2G system, the A8 algorithm can only perform calculations related to triplets in 2G, and there is no f1-f5 function in the WCDMA system, nor can it perform quintuple parameter correlation. calculation
Therefore, it can still only realize the network authentication terminal, but cannot provide the function of terminal authentication network, that is, it can only provide the function of one-way authentication
[0021] That is to say, when the SIM card uses a WCDMA terminal or a GSM / WCDMA dual-mode terminal and a WCDMA network, there is a function that cannot provide the terminal authentication network
In this way, there is still a security hole to be attacked by a fake base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system
  • System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system
  • System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] For the convenience of implementation and application, the present invention is based on the principle of minimum modification to the existing mechanism, and does not add messages or parameters in the standard interface of the 3rd Generation Partnership Project (hereinafter referred to as 3GPP) international standard. According to the existing 3GPP protocol specification, when the SIM card is used in the WCDMA system, although the AUTN parameters have been defined, they are not transmitted or have no effect. The present invention will take full advantage of this parameter. The specific solution for this transmission is: in the MSC / SGSN and the WCDMA terminal or the GSM / WCDMA dual-mode terminal in the WCDMA system, an authentication unit is added respectively, and the authentication unit includes an authentication algorithm and corresponding calculation functions, The authentication algorithm here should have the following two characteristics:

[0040] 1) The algorithm sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a device, which realizes a terminal authentication network when a SIM card uses a WCDMA or GSM / WCDMA terminal and a WCDMA network. The device includes a SIM card, the terminal of an authentication unit and the network entity of the authentication unit, wherein, the SIM card is used to generate a temporary key Kc, the terminal of the authentication unit is used to calculate the parameters of the terminal authentication network and compare the parameters with the corresponding parameters sent by a network, and the network entity of the authentication unit is used to calculate the parameters of the terminal authentication network of the network side, which are then sent to the terminal. The invention provides a method and the device, which can be conveniently realized and applied and realize the terminal authentication network when the SIM card of 2G uses the WCDMA or GSM / WCDMA terminal and the WCDMA network, so a bidirectional authentication mechanism is provided to make up for the security vulnerability of being attacked by counterfeit base stations, thus enhancing the security mechanism under the widely existing situations.

Description

technical field [0001] The present invention relates to the Subscriber Identity Module (hereinafter referred to as the SIM card) of the Global System for Mobile Communications (hereinafter referred to as GSM) using Universal Mobile Communication System Terrestrial Wireless Access (hereinafter referred to as UMTS, also known as Wideband Code Division Multiple Access, hereinafter referred to as WCDMA) When a terminal or a GSM and WCDMA dual-mode terminal uses a WCDMA system, a method and a device for realizing terminal authentication network. Background technique [0002] In the current GSM or general packet radio service (hereinafter referred to as GPRS) system, for each user, the user is stored in the home location register (hereinafter referred to as HLR) or authentication center (hereinafter referred to as AUC) and the SIM card of the user respectively. The root key (indicated by Ki below) and two authentication encryption algorithms (indicated by A3 and A8 below). The au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/28H04Q7/32H04Q7/38
Inventor 刘美丽
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products