Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and terminal for telecom smart card

A smart card and telecommunications technology, applied in the field of data security, can solve the problems of poor phone terminal security, theft of algorithms and keys, leakage of algorithms and keys, etc., to avoid the loss of call charges

Inactive Publication Date: 2009-08-19
BEIJING WATCH DATA SYST
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the authentication method in the prior art needs to directly prefabricate the same algorithm and key in the phone terminal as in the telecom smart card, so it is necessary to inform all terminal manufacturers of the algorithm and key. The link management is chaotic, resulting in the leakage of the algorithm and key, and the security of the phone terminal is poor, and it is easy for the attacker to steal the algorithm and key, which brings opportunities for criminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and terminal for telecom smart card
  • Authentication method and terminal for telecom smart card
  • Authentication method and terminal for telecom smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The following descriptions are only some embodiments of the present invention. For those of ordinary skill in the art, Other implementations of the present invention can also be obtained according to these embodiments without any creative effort.

[0017] The authentication and authentication method of the telecom smart card provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0018] Step 11: preset the same encryption algorithm and ensure the same authentication key in the telecommunications smart card and the embedded security module ESAM, and the embedded security module is located in the terminal;

[0019] Step 12: Before performing network authentication, set the network authentication user aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method of a telecommunication intelligent card and a terminal thereof which relate to the data security field. The method and the terminal can prevent a wireless business phone and the telecommunication card of a wireless public phone from embezzling by the unwarranted terminal, and avoid telephone expenses running off. The method includes steps as follows: preplacing a same encryption arithmetic and an authentication key ensuring same on the telecommunication intelligent card and an embedded type safe module ESAM, the embedded type safe module locates in the terminal; placing the network authentication user authentication information as a false information before executing the network authentication; processing authentication through the terminal as a transmitting channel between the telecommunication intelligent card and ESAM by using the encrypting arithmetic and the authentication key; if passing through authentication, placing the network authentication user authentication information as a true information of the telecommunication intelligent card; executing network authentication according with the network authentication user authentication information.

Description

technical field [0001] The invention relates to the field of data security, in particular to an authentication method and a terminal for a telecommunication smart card. Background technique [0002] In order to cooperate with the village-to-village project and develop customers in rural areas, China Mobile and China Unicom have promoted wireless business phones and wireless public phones across the country. They are charged according to the fixed-line tariff standard, because this charging standard is cheaper than ordinary mobile phones, and The wireless network can only authenticate and authenticate telecom smart cards, leading some people to use the smart cards of wireless business phones and wireless public phones in mobile terminals such as mobile phones by stealing cards or combining cards, resulting in A large number of phone bills were lost, which interfered with the normal tariff policy. [0003] In view of the above-mentioned card theft and card combination phenome...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W88/02H04W12/40
Inventor 陈风雷董崇波路如毅
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products