Method and system for machine-card two-way authentication

A two-way authentication, machine card technology, applied in wireless communication, network data management, electrical components, etc., can solve problems such as poor flexibility and invalid authentication mechanism

Active Publication Date: 2017-11-21
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These schemes based on secret information sharing require preset secret information for all cards and terminals to be bound, which is less flexible, and once the secret information is cracked, the entire authentication mechanism will fail.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for machine-card two-way authentication
  • Method and system for machine-card two-way authentication
  • Method and system for machine-card two-way authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, the embodiments of the present invention are not limited thereto.

[0049] The embodiment of the method of the present invention is based on the computational Diffie-Hellman problem, and in the process of two-way authentication, the network side can update the secret information preset in the device and the card in time, resisting the attacker's eavesdropping, replay, etc. attacks, so that the scheme has higher security. Store the serial numbers of MTC devices and UICCs through HSS; the serial numbers of MTC devices and UICCs are not public and are secret information; HSS maintains the initial random value list of MTC devices and the list of serial numbers of MTC devices and UICCs; HSS only distributes part of the private key For UICC, there is no key escrow issue.

[0050] Such as figure 1 As shown, it is a flowchart of the principl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a machine-card bidirectional authentication method and system. The method includes: the HSS presets the identity and serial number to the MTC and the UICC respectively, and generates an initial random number for the MTC; the MTC generates the first random number and sends it to the UICC; the UICC calculates the first intermediate value, and uses its own identity, the first intermediate value and the second random number are sent to MTC; MTC calculates the second intermediate value, and sends its own identity, UICC identity, first random number, second random number, first intermediate value, and second intermediate value to HSS; HSS Judge whether MTC and UICC are legal, and return the result to MTC; MTC and UICC complete their own serial number update. Compared with the prior art, the present invention can solve the two-way authentication problem in the binding process of the terminal and the card without requiring the machine and the card to share secret information, and ensure that the bound terminal and the card are legal.

Description

technical field [0001] The invention relates to the technical field of machine-card authentication, in particular to a method and system for two-way machine-card authentication. Background technique [0002] In the machine-card binding process in the prior art, some machine-card binding methods only support one-way authentication of the conditional access card to the terminal. For example, a number is preset for the terminal, and the user is prompted directly through the man-machine interface to send the terminal number and conditional access card number to the conditional access system to perform machine card binding, and then send or use a function to generate a user key to verify the condition Receive the information or number, etc., and meet the conditions to receive the verification of the terminal by the card. [0003] Although some improved machine-card binding methods support two-way authentication between the card and the terminal, they require the card and the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/18H04W12/00
Inventor 张滨袁捷冯运波乔喆邱勤王馨裕安宝宇
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products