Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for updating authentication key of user equipment and user equipment

A technology of user equipment and update method, which is applied in the field of authentication code update, can solve the problem of not being able to limit the communication function of the copy card, and achieve the effect of protecting legal rights and achieving low cost

Inactive Publication Date: 2011-09-28
ZTE CORP
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the problem of copying cards, the general preventive measures are basically passive prevention, that is, when receiving reports, etc., by replacing the user identification card for the user to prevent the copying card from accessing the network; or, by sharing password data (SSD, Shared Secret Data ) and other technologies to ensure that the current subscriber identity card can only access one UE. However, when the card copyer obtains the authentication code (Akey) information of the subscriber identity card, updating the SSD method will not limit the communication function of the copy card , in particular, it is relatively easy for the current communication network to obtain Akey information through relevant means. Therefore, there is an urgent need for more secure and effective means to prevent user identification card duplication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating authentication key of user equipment and user equipment
  • Method and system for updating authentication key of user equipment and user equipment
  • Method and system for updating authentication key of user equipment and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] In this example, the user initiates an Akey update through a supplementary service. figure 1 It is a flowchart of a method for updating an authentication code of a user equipment according to Embodiment 1 of the present invention, as shown in figure 1 As shown, the method for updating the user equipment authentication code in this example specifically includes the following steps:

[0062] In step 101, an Akey update process is initiated through a supplementary service operation of the UE.

[0063] In the present invention, the so-called supplementary service operation is a newly added service specially used for initiating an Akey update request for UE; this service can be provided as user's subscription data, or as a value-added service provided by an operator. Those skilled in the art should understand that it is easy to make the UE initiate a certain service request.

[0064] In the present invention, the UE sends an Akey update request to a Mobile Switching Center...

Embodiment 2

[0080] In this example, the operator updates the Akey periodically. figure 2 It is a flow chart of the method for updating the user equipment authentication code in Embodiment 2 of the present invention, as shown in figure 2 As shown, the method for updating the user equipment authentication code in this example specifically includes the following steps:

[0081] Step 201, the user initiates a location update.

[0082] Step 202, MSCe triggers a registration message to HLRe.

[0083] Step 203, HLRe determines whether the user has the authority to update the Akey, and determines whether the update time threshold set by the operator has been reached. If the time threshold for updating the Akey has been reached, the HLRe instructs the MSCe to initiate a RUIDIR operation.

[0084] In step 204, the MSCe initiates a RUIDIR operation, instructing the user to input the service operation password.

[0085] Step 205, MSCe collects the service operation password and sends it to HLRe...

Embodiment 3

[0093] In this example, the user initiates a UIM card Akey update through a supplementary service. image 3 It is a flowchart of a method for updating an authentication code of a user equipment according to Embodiment 3 of the present invention, as shown in image 3 As shown, the method for updating the user equipment authentication code in this example specifically includes the following steps:

[0094] In step 301, the user initiates an Akey update process through a supplementary service operation.

[0095] In step 302, the MSCe initiates a FEATREQ to the HLRe, carrying parameters such as the user's MIN, ESN, and supplementary service code.

[0096] In step 303, the HLRe determines whether the user has the authority to update the Akey, and instructs the MSCe to initiate a RUIDIR operation.

[0097] In step 304, the MSCe initiates a RUIDIR operation, instructing the user to input the service operation password.

[0098] Step 305, MSCe collects the service operation passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for updating an authentication key of user equipment, comprising the steps: when the updating condition of the authentication key (Akey) of the UE (User Equipment) is met, a network side initiates the exchange of Akey related parameters with the UE; and the network side and the UE respectively generate a new Akey based on the Akey related parameters. Simultaneously, the invention discloses a system for updating the authentication key of the user equipment for realizing the method, and the user equipment. According to the invention, the Akey of the UE can be ceaselessly updated, in such a way, considerable difficulties are created when the Akey of the UE is utilized to replicate a user identification card of the UE, and even if the replication succeeds, the replicated card become invalid owing to the ceaseless updating of the Akey of the UE, therefore, legal rights of UE users and operators are put under effective protection. The method and the system disclosed by the invention can be implemented at lower cost only by updating the UE and the limited network side elements correspondingly.

Description

technical field [0001] The present invention relates to an update technology of an authentication code (Akey) of a user identification card based on OTA (Over the Air Technology), in particular to a method and system for updating an authentication code of a user equipment, and user equipment. Background technique [0002] At present, there are many duplications of subscriber identification cards in the mobile communication market, which brings certain losses to users and operators. In particular, when criminals obtain the copied card, they can monitor the call of the user of the copied card and perform malicious fraudulent calls. For the problem of copying cards, the general preventive measures are basically passive prevention, that is, when receiving reports, etc., by replacing the user identification card for the user to prevent the copying card from accessing the network; or, by sharing password data (SSD, Shared Secret Data ) and other technologies to ensure that the cu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W8/22H04W12/06H04W12/0433H04W12/126
CPCH04W12/04H04W12/041
Inventor 仝黎李俊
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More