Method for reversely cloning subscriber identity module, device and system

A technology of user identification and user equipment, which is applied to security devices and key distribution, can solve problems such as user network eavesdropping, user fee loss, and interference with privacy, and achieve the effect of avoiding and reducing security risks

Inactive Publication Date: 2011-01-05
HUAWEI TECH CO LTD
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found in the process of realizing the present invention that there are some technologies that can realize the duplication of the subscriber identification module at present, and those skilled in the art are used to calling this dupli

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reversely cloning subscriber identity module, device and system
  • Method for reversely cloning subscriber identity module, device and system
  • Method for reversely cloning subscriber identity module, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0019] Such as Figure 1a Shown is a flow chart on the authentication center side of a method for anti-cloning a subscriber identity module provided by an embodiment of the present invention, including:

[0020] Step 101a, sending a new root key K or parameters used to calculate the new root key K, so that the user equipment updates the root key K;

[0021] The new root key K or the parameters used to calculate the new root key K can be generated by the authentication center, and the generation method can be determined by the operator's policy. If the above parameters are generated, according to the operator's policy, the user equipment can negotiate with the authentication center and share a certain algorithm for generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for reversely cloning a subscriber identity module. The method comprises the following steps of: updating a root key K by user equipment by transmitting a new root key K or calculating parameters of the new root key K; receiving updating confirmation information transmitted by the user equipment after updating the root key K; and updating the root key K stored by an authentication center per se to ensure that another subscriber identity module/universal subscriber identity module (SIM/USIM) card which has the same international mobile subscriber identity (IMSI) as the user equipment cannot be authenticated through the old root key K and the authentication center so as not to be accessed to a network. The method fulfils the aim of reducing the safety risk brought by cloning. The embodiment of the invention also discloses a data transmission device and a data transmission system.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a method, device and system for reverse cloning of a Subscriber Identity Module. Background technique [0002] In the GSM (Global System for Mobile Communications, Global System for Mobile Communications) / UMTS ((Universal Mobile Telecommunications System, Universal Mobile Communications System) system, a user can use a SIM (Subscriber Identity Module, Subscriber Identity Module) card to access a mobile network. The SIM card stores the most important information such as the user's permanent identity IMSI (International MobileSubscriber Identit, International Mobile Subscriber Identity), the root key K. The SIM card is also an important entity when the user and the network are authenticated. The SIM card and the HLR (Home LocationRegister, Home Location Register) / AuC (Authentication Center, Authentication Center) performs AKA (Authentication and Key Agreement, authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04L9/08H04W12/0433H04W12/126
Inventor 邱勇张爱琴陈璟杨义
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products