Network assisted terminal to SIMM/UICC key establishment

A shared key, mobile terminal technology, applied in the field of network-assisted terminal to SIMM/UICC key establishment

Inactive Publication Date: 2008-05-07
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0033] It can be seen that in the current state of technology, problems occur wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network assisted terminal to SIMM/UICC key establishment
  • Network assisted terminal to SIMM/UICC key establishment
  • Network assisted terminal to SIMM/UICC key establishment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] The present invention relates to a method for establishing a shared key between a mobile device and a smart card (including SIM or UICC applications). In particular, the present invention relates to a method that utilizes a mobile network operator (and user database) to perform key exchange, and the key exchange is necessary to establish a shared key between a mobile device and a smart card (SIM or UICC) of. To help achieve this goal, the method uses a key generation function associated with the existing GSM / UMTS authentication standard. Hereinafter, an embodiment of the present invention will be explained step by step with reference to FIG. 3.

[0043] Referring to FIG. 3, the signal flow chart therein illustrates step by step the key exchange method according to the first embodiment of the present invention. In this embodiment, it is assumed that the mobile device 302 has already accessed and is connected to the cellular network 304. This means that the mobile device 302 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is described herein which enables a mobile device and a smart card (SIM, UICC) to establish a shared secret KE which can then be used to secure an interface between themselves. A mobile operator helps in the establishment of the shared secret (KE) by taking part in a key exchange between the mobile device and smart card. The mobile operator's involvement is desirable since they can keep track of mobile device-smart card pairs and if necessary they can block the security establishment between the mobile device and the smart card in order to prevent fraudulent behavior.

Description

technical field [0001] The invention relates to a method for establishing a shared key between a mobile device and a smart card (SIM or UICC). In particular, the method employs the mobile network operator to perform a key exchange, which is necessary to establish a shared secret, which is then used to secure the interface between the mobile device and the smart card. Background technique [0002] The following abbreviations are hereby defined, at least some of which are referred to in the ensuing description of the prior art and the present invention. [0003] 3GPP Third Generation Partnership Project [0004] AVEC Certification Vector [0005] BSF self-starting server function [0006] B-TID self-service transaction identifier [0007] CMLA Content Management License Administrator [0008] DRM digital rights management [0009] GAA General Authentication Architecture [0010] GSM Global System for Mobile Communications [0011] GBA Generic Boot Architecture [0012...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04Q7/32
Inventor C·格尔曼
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products