Bidirectional authentication method and system of phone card

A two-way authentication, machine card technology, applied in the direction of electrical components, wireless communication, network data management, etc., can solve the problems of authentication mechanism failure and poor flexibility

Active Publication Date: 2014-08-20
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These schemes based on secret information sharing require preset secret information for all cards and terminals to b...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method and system of phone card
  • Bidirectional authentication method and system of phone card
  • Bidirectional authentication method and system of phone card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, the embodiments of the present invention are not limited thereto.

[0046] The embodiment of the method of the present invention is based on the computational Diffie-Hellman problem, and in the process of two-way authentication, the network side can update the secret information preset in the device and the card in time, resisting the attacker's eavesdropping, replay, etc. attacks, so that the scheme has higher security. Store the serial numbers of MTC devices and UICCs through HSS; the serial numbers of MTC devices and UICCs are not public and are secret information; HSS maintains the initial random value list of MTC devices and the list of serial numbers of MTC devices and UICCs; HSS only distributes part of the private key For UICC, there is no key escrow issue.

[0047] Such as figure 1 As shown, it is a flowchart of the principl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a bidirectional authentication method and system of a phone card. The method comprises the following steps that: a home subscriber server (HSS) and a universal integrated circuit card (UICC) respectively preset an identity identifier and a serial number and an initial random number of a machine-type communications (MTC) unit is generated; the MTC generates a random number 1 and sends the random number 1 to the UICC; the UICC calculates an intermediate value 1 and sends the identity identifier of the UICC, the intermediate value 1, and a random number 2 to the MTC; the MTC calculates an intermediate value 2 and sends the identity identifier of the MTC, the UICC identity identifier, the random number 1, the random number 2, the intermediate value 1, and the intermediate value 2 to the HSS; the HSS determines whether the MTC and the UICC are valid and returns the result to the MTC; and the MTC and the UICC complete serial number updating. Compared with the prior art, the provided method and system has the following beneficial effects: a problem of bidirectional authentication during the terminal and card bonding process can be solved under the circumstances that secrete information sharing by the phone card is not required; and validity of the bonded terminal and card is ensured.

Description

technical field [0001] The invention relates to the technical field of machine-card authentication, in particular to a method and system for two-way machine-card authentication. Background technique [0002] In the machine-card binding process in the prior art, some machine-card binding methods only support one-way authentication of the conditional access card to the terminal. For example, a number is preset for the terminal, and the user is prompted directly through the man-machine interface to send the terminal number and conditional access card number to the conditional access system to perform machine card binding, and then send or use a function to generate a user key to verify the condition Receive the information or number, etc., and meet the conditions to receive the verification of the terminal by the card. [0003] Although some improved machine-card binding methods support two-way authentication between the card and the terminal, they require the card and the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/18H04W12/00
Inventor 张滨袁捷冯运波乔喆邱勤王馨裕安宝宇
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products