Method and system for remote initialization of Internet of Things virtual subscriber identity module card
A virtual user and identification module technology, applied in the field of the Internet of Things, can solve problems such as insecurity, users cannot initialize operations, steal or tamper with virtual SIM card data, etc., and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0048] Embodiment 1. A method for initializing a virtual SIM card of the Internet of Things, such as figure 1 Shown, including:
[0049] 101. After the IoT terminal is turned on and connected to the Internet, it sends a connection request to the terminal authentication device on the operator side according to the preset address, which carries the terminal identification encrypted by the preset root key and the preset, uniquely corresponding to The first authentication number of the root key;
[0050] 102. After receiving the connection request, the terminal authentication device uses the root key corresponding to the first authentication number carried in the connection request to decrypt to obtain the terminal identification, and if the authentication of the IoT terminal is successful, it generates The session key and the second authentication number uniquely corresponding to the session key are sent to the virtual card management device on the operator side together with the term...
Example Embodiment
[0094] Embodiment 2. A system for initializing the virtual SIM card of the Internet of Things, such as figure 2 Shown, including:
[0095] IoT terminal 21, terminal authentication device 22 on the operator side, and virtual card management device 23;
[0096] The Internet of Things terminal 21 is used to send a connection request to the terminal authentication device 22 according to a preset address after it is turned on and connected to the Internet, which carries the terminal identification encrypted by the preset root key, and the preset , The first authentication number uniquely corresponding to the root key; after receiving the information returned by the terminal authentication device 22, use the root key to decrypt, and use the decrypted session key to perform the terminal identification After being encrypted, it is carried in the card data request and sent to the virtual card management device 23;
[0097] The terminal authentication device 22 is configured to, after recei...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap