Unlock instant, AI-driven research and patent intelligence for your innovation.

Method to authenticate user equipment in a mobile network

A technology of user equipment and mobile network, which is applied in the field of communication and can solve problems such as huge costs, users, and interference

Inactive Publication Date: 2013-12-25
ALCATEL LUCENT SAS
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This would mean replacing the UICC on all units sold and in transit, incurring potentially significant expense and user disruption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method to authenticate user equipment in a mobile network
  • Method to authenticate user equipment in a mobile network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention relates to a method for authenticating a user equipment in a mobile network, such as WCDMA, 3G or LTE, in particular using a smart card, such as a UICC.

[0038] figure 1 The different entities and their interaction during the installation and authentication 1 of a smart card using a specific embodiment of the method according to the invention are shown in general terms. These entities are represented as blocks: primary authentication authority 3 , manufacturer 5 , user 7 and mobile network operator 9 . Method steps corresponding to interactions between entities 3 to 9 are indicated by arrows, steps performed internally by an entity are indicated by circles. These steps are numbered i to ix.

[0039] The first step i shows the sale or transport of the smart card from the primary certification authority 3 to the user equipment manufacturer 5 . Here, the smart card is a UICC module. Apparently, these smart cards are in a "blank" state, meaning they are n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method to authenticate a user equipment in a wireless network using a smart card (11) comprising at least one credential token (15, 17), wherein the smart card (11) is accredited by a primary authentication authority (3) and installed in the user equipment. The method comprises the following steps of transferring a first credential token (15, 17) of the smart card (11) installed in the user equipment to a selected first mobile network operator (9, 13), and using the first credential token (15, 17) to authenticate the user equipment on the mobile network of the selected mobile network operator (9, 13). The invention also relates to the associated smart card.

Description

technical field [0001] The present invention relates to the field of communications, and more particularly to authentication of user equipment in mobile networks, such as radio access networks. Background technique [0002] In current mobile networks, such as Wideband Code Division Multiple Access Mobile Communication System (WCDMA) / Third Generation Mobile Communication System (3G) or Long Term Evolution Technology (LTE), the authentication of user equipment is to use the so-called universal integrated circuit card (Universal Integrated Circuit Card, UICC) smart card, which is usually a Java card (Java card) inserted into the user device. As used herein, the term user equipment means a user / terminal pair. [0003] The UIC runs a specific application known as the Universal Subscriber Identity Module (USIM) to perform user equipment authentication. The USIM includes confidentially and securely stored user information such as codes such as Personal Identification Number (PIN)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L9/3234H04L63/062H04L63/0853H04L2209/805H04W12/04H04W12/068
Inventor 马赫迪·查克里阿尔贝托·孔蒂劳伦·托马斯
Owner ALCATEL LUCENT SAS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More