Method, device and system of verification of safety association between terminal equipment and user card

A technology for terminal equipment and verification terminals, which is applied in security devices, electrical components, wireless communication, etc., and can solve the problems of short PIN code key space, inability to perform user card authentication, and complex user card functions.

Active Publication Date: 2013-05-15
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above first solution, it is necessary to add functional modules to the user card to establish a secure channel, making the functions of the user card more complicated; in the above second solution, due to the short key space of the PIN code, The attacker can try to perform brute force cracking, and can only perform one-way authentication of the terminal device to the user card, but cannot authenticate the user card to the terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of verification of safety association between terminal equipment and user card
  • Method, device and system of verification of safety association between terminal equipment and user card
  • Method, device and system of verification of safety association between terminal equipment and user card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In the prior art, the method of verifying whether the user card and the terminal device are securely associated either needs to expand the function of the user card, or can only realize the one-way authentication of the user card by the terminal device, and the solutions in the prior art are all on the terminal side These solutions cannot inform the network side of the verification results of user cards and terminal devices. Therefore, they cannot meet the needs of the network side for anomaly detection of terminal devices in application scenarios such as the unattended Internet of Things.

[0013] In view of this, the embodiments of the present invention provide a method, device, and system for verifying the security association between a user card and a terminal device, so that the network side can judge and know the verification result of whether the user card and the terminal device are securely associated, and realize the security association between the user card an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system of verification of safety association between terminal equipment and a user card. The method, the device and the system of the verification of the safety association between the terminal equipment and the user card are used for achieving two-way safety verification between the user card and the terminal equipment under the premise that functions of the user card are not expanded, wherein the method of the verification of the safety association between the terminal equipment and the user card comprises receiving a first verification request sent by the terminal equipment when the terminal equipment accesses a core network; searching for a first authentication key which corresponds to a user card identification in a corresponding relationship which is pre-stored between the user card identification and the first authentication key according to the user card identification carried by the verification request; carrying out encryption on a terminal identification and the user card identification carried in the verification request by using the first authentication key which is found, and obtaining a second to-be-verified terminal identification; confirming that the safety association verification between the terminal equipment and the user card passes when a first to-be-verified terminal identification and the second to-be-verified terminal identification are the same; and confirming that the safety association verification between the terminal equipment and the user card does not pass when the first to-be-verified terminal identification and the second to-be-verified terminal identification are not the same.

Description

technical field [0001] The invention relates to the technical field of mobile communication security, in particular to a method, device and system for verifying the security of terminal equipment and user cards. Background technique [0002] In the existing mobile communication network, there is no security mechanism between the terminal equipment and the subscriber card, and the user can place any subscriber card in any terminal equipment. The subscriber card includes a Subscriber Identity Module (SIM, Subscriber Identity Module) card Or a Universal Subscriber Identity Module (USIM, Universal Subscriber Identity Module) card, etc. This method of use does not have security problems in common application scenarios, but it may have security problems in unattended scenarios such as the Internet of Things. For example, an attacker can destroy the communication between the terminal device and the user card through physical contact. Contact information, so that the specific user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 齐旻鹏朱红儒
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products