Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for authenticating terminal and telecommunication smart card

A terminal authentication and smart card technology, which is applied in the field of data security, can solve problems such as maintenance inconvenience, no solution, and terminal failure rate increase, and achieve the effects of avoiding the loss of call charges, maintaining tariff policies, and curbing machine-card separation

Inactive Publication Date: 2011-04-20
BEIJING WATCH DATA SYST +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technical solutions not only lead to the increase of the terminal failure rate and the inconvenience of maintenance, but also with the continuous emergence of encryption and cracking methods, the phenomenon of illegal card sets still occurs from time to time
However, there is no feasible solution to the problem of kits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authenticating terminal and telecommunication smart card
  • Method and device for authenticating terminal and telecommunication smart card
  • Method and device for authenticating terminal and telecommunication smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The following descriptions are only some embodiments of the present invention. For those of ordinary skill in the art, Other implementations of the present invention can also be obtained according to these embodiments without any creative effort.

[0032] Embodiment 1 of the present invention mainly solves the problems of SIM cards being stolen and terminals being set out, etc. through a terminal verification combined with platform management scheme. In terms of terminal verification, it is preferable to use the terminal and an embedded security module (Embedded Security Access Module, ESAM) for authentication, without modifying the standard hardware, which saves costs and is easy to set up and maintain, and has a low failure rate; On the one hand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for authenticating a terminal and a telecommunication smart card, belonging to the field of data safety and effectively preventing the card from separatinThe invention discloses a method and a device for authenticating a terminal and a telecommunication smart card, belonging to the field of data safety and effectively preventing the card from separating from the device. A method provided by embodiments comprises the following steps: network authentication user authentification information in the telecommunication smart card is set to be false inforg from the device. A method provided by embodiments comprises the following steps: network authentication user authentification information in the telecommunication smart card is set to be false information before network authentication is executed; authentication between the telecommunication smart card and the terminal is executed; the network authentication user authentification information inmation before network authentication is executed; authentication between the telecommunication smart card and the terminal is executed; the network authentication user authentification information inthe telecommunication smart card is set to be true information when the authentication passes; the network authentication is executed according to the network authentication user authentification infothe telecommunication smart card is set to be true information when the authentication passes; the network authentication is executed according to the network authentication user authentification information; a control and monitor console obtains and verifies the information of the terminal and generates verification information when the terminal is firstly used or the telecommunication smart cardrmation; a control and monitor console obtains and verifies the information of the terminal and generates verification information when the terminal is firstly used or the telecommunication smart cardchanges after the network authentication, and the terminal obtains the verification information from the control and monitor console and stores a state indicating whether verification passes or not; changes after the network authentication, and the terminal obtains the verification information from the control and monitor console and stores a state indicating whether verification passes or not;the terminal judges whether the terminal passes the verification of the control and monitor console or not according to the verification information; if the terminal passes the verification, a user isthe terminal judges whether the terminal passes the verification of the control and monitor console or not according to the verification information; if the terminal passes the verification, a user ispermitted to use the terminal, or else the user is restricted to use the terminal. permitted to use the terminal, or else the user is restricted to use the terminal.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method for authenticating a terminal and a telecommunication smart card, a terminal and a network device. Background technique [0002] With the rapid development of wireless communication technology, wireless communication products are widely used in various fields due to their powerful functions. In order to seize market share in the fierce market competition, mobile operators have launched terminal products with wireless functions such as wireless public phones / wireless business phones, and quickly occupied a large share of the fixed-line phone market. [0003] Moreover, in order to rapidly expand the user market of urban governments, enterprises and households, and rural areas, mobile operators have adopted a strong "subsidy" policy in terms of promotion models and tariff plans, such as wireless business calls and wireless public calls. Charged according to the fixed telephone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/71H04W12/72
Inventor 乔辉王林峰孙健韩强宋津津朱红岩宋徐强高波林忠侣
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products