Authentication random number detection method and SIM (Subscriber Identity Module) card

A detection method and random number technology, applied in authentication random number detection, SIM card field, can solve problems such as production process and process leakage

Active Publication Date: 2011-03-30
CHINA MOBILE COMM CORP TIANJIN
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the possibility of leakage of the production process and process, the attacker will know the existing authentication random number detection method, and then

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication random number detection method and SIM (Subscriber Identity Module) card
  • Authentication random number detection method and SIM (Subscriber Identity Module) card
  • Authentication random number detection method and SIM (Subscriber Identity Module) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1 of the present invention provides an authentication random number detection method, such as figure 1 shown, including:

[0035] Step S101, the SIM card determines the time interval t between the received authentication random number sent by the network side this time and the last received authentication random number sent by the network side.

[0036] Step S102, judging whether the time interval t determined in step S101 is less than the set time threshold h, if yes, proceed to step S103, otherwise, proceed to step S106.

[0037] This step may also be to judge whether the time interval t is less than or equal to the set time threshold h, if yes, go to step S103, otherwise, go to step S106.

[0038] Step S103 , adding the set change value i to the attack detection parameter S to obtain an updated attack detection parameter S, that is, S=S+i.

[0039]Step S104 , judging whether the updated attack detection parameter S obtained after executing step S103 is g...

Embodiment 2

[0063] Embodiment 2 of the present invention provides an authentication random number detection method, such as figure 2 shown, including:

[0064] Step S201, the SIM card determines the time interval t between the received authentication random number sent by the network side this time and the last received authentication random number sent by the network side.

[0065] Step S202, judging whether the current detection mode of the SIM card is the normal mode or the attacked mode, if it is the normal mode, go to step S203, and if it is the attacked mode, go to step S211.

[0066] Step S203, judging whether the time interval t determined in step S201 is less than the first set time threshold h, if yes, proceed to step S204, otherwise, proceed to step S208.

[0067] This step may also be to judge whether the time interval t is less than or equal to the first set time threshold h, if yes, go to step S204, otherwise, go to step S208.

[0068] Step S204 , adding the set change va...

Embodiment 3

[0091] Based on the same inventive concept, according to the authentication random number detection method provided by the first embodiment of the present invention, the third embodiment of the present invention also provides a SIM card, the schematic diagram of which is as follows image 3 As shown, it includes: a determination judgment unit 301, a first detection determination unit 302 and a second detection determination unit 303;

[0092] The determination and judgment unit 301 is configured to determine the time interval between receiving the authentication random number sent by the network side this time and last time; and judge whether the time interval is less than the set time threshold, and if so, notify the above-mentioned first detection and determination Unit 302, otherwise, notify the above-mentioned second detection determination unit 303;

[0093] The above-mentioned first detection determination unit 302 is configured to add the attack detection parameter to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication random number detection method and an SIM (Subscriber Identity Module) card. The method comprises the following steps of: determining the time interval from the current time of receiving authentication random number sent by the network side by the SIM card to the last time; adding set change values to attack detection parameters to obtain the updated attack detection parameters when the time interval is smaller than the set time threshold value; determining that the detection of the authentication random number received at the current time is not passed when the updated attack detection parameters are not smaller than the set attack detection parameter threshold value, otherwise determining that the detection of the authentication random number received at the current time is passed; determining that the detection of the authentication random number received at the current time is passed when the time interval is not smaller than the set time threshold value; and subtracting the set change value from the attack detection parameters to obtain the updated attack detection parameters when the attack detection parameters are greater than the set original value. Thereby, attackers can not realize the interpretation of confidential information of the SIM card in the limited time, and the attack of the attackers can be effectively resisted.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an authentication random number detection method applied to SIM card authentication, and a SIM card. Background technique [0002] SIM (Subscriber Identity Module) card cloning is an attacker who obtains SIM card confidential information KI (Key Identifier) ​​and IMSI (International Mobile Subscriber Identifier) ​​through certain means; uses KI and IMSI to copy the same SIM card technology, and the cloned card generated by copying is the same as the original Cards make no difference. In the existing attack method, the attacker sends a certain number (generally between 20,000 and 600,000) of authentication random numbers to the SIM card, and obtains the authentication result returned by the SIM card according to the received authentication random numbers, analyzes and uses the authentication The right result "collision" to achieve cracking. [0003] In order to resist the exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L9/32
Inventor 王真王家新李永春杨芳芳周亦瑾赵强
Owner CHINA MOBILE COMM CORP TIANJIN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products