A SIM card and its anti-cloning method and device

A card locking and threshold technology, applied in the field of communication, can solve problems such as SIM card cloning, and achieve the effects of improving security, minimizing resources, and improving accurate judgment

Active Publication Date: 2019-04-09
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] Embodiments of the present invention provide a SIM card and its anti-cloning method and device to solve the problem of SIM card cloning in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A SIM card and its anti-cloning method and device
  • A SIM card and its anti-cloning method and device
  • A SIM card and its anti-cloning method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Such as figure 1 As shown, the flow chart of the steps of the SIM card anti-cloning method provided by Embodiment 1 of the present invention specifically includes the following steps:

[0065] Step 101: Record the number of received authentication requests for the SIM card, and record the period value according to the set counting threshold.

[0066] In this step 101, when it is monitored that there is an authentication request to access the SIM card, the authentication request needs to be recorded once; at the same time, the period value will also be recorded according to the set counting threshold.

[0067] Preferably, counting may be performed by using the frequency-divided clock signal, and when the counted value reaches a set counting threshold once, the recorded cycle value is increased. Wherein, frequency division processing can be performed on the input clock signal according to the frequency of the required clock signal and the set counting threshold.

[0068...

Embodiment 2

[0082] Such as figure 2 As shown, it is a schematic structural view of the SIM card anti-cloning device provided by Embodiment 2 of the present invention, which mainly includes the following structural units:

[0083] The recording unit 201 is configured to record the number of received authentication requests for the SIM card, and record the period value according to the set counting threshold.

[0084] Preferably, the recording unit is specifically configured to count by the frequency-divided clock signal, and increase the recorded period value every time the counted value reaches a set counting threshold.

[0085] In the embodiment of the present invention, the SIM card anti-cloning device further includes: a selection unit, configured to select a frequency divider for the clock signal to perform frequency division according to the frequency of the clock signal and a set counting threshold.

[0086] The comparison unit 202 is configured to compare the number of authentica...

Embodiment 3

[0094] Such as image 3 As shown, it is a SIM card introduced in Embodiment 3 of the present invention, including the SIM card anti-cloning device, frequency divider, and counter in Embodiment 2.

[0095] The above-mentioned anti-cloning process of the SIM card will be described in detail below in conjunction with specific examples.

[0096] When the SIM card is powered on, the external clock will provide a clock signal. If the SIM card anti-cloning device will determine that the frequency of the clock signal received by the SIM card is 10MHz, select a 64 frequency divider according to the preset standard signal frequency of 0.15MHz, and trigger the frequency divider to divide the frequency of the clock signal 0.15MHz. The frequency divider outputs the standard clock signal after frequency division, and activates the counter for counting. The frequency division process described above is very short and can be ignored. When the count of the counter reaches FFFFFFFF, the SIM...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a SIM card and its anti-cloning method and device. The main content includes: using the clock signal provided by an external clock to record the cycle value, and according to the recorded cycle value, the data received in the cycle that needs to be compared The number of authentication requests of the SIM card is compared with the threshold, and after the comparison result satisfies the card locking condition, the SIM card is locked. Since the threshold can be flexibly set according to actual experience, the legitimacy of the authentication can be judged according to the number of authentications received in the period that needs to be compared, thereby ensuring that the attacker cannot obtain valid authentication data in a short period of time , improving the security of the SIM card.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a SIM card and its anti-cloning method and device. Background technique [0002] In the existing Global System for Mobile Communications (GSM) network, the COMP128-1 authentication algorithm has the inherent security flaw of "collision". This defect is due to the fact that the COMP128-1 authentication algorithm uses the authentication random number and the authentication key (Ke y identifier, Ki) input, after the operation, the data is compressed to obtain 96-bit data output. In this process, for part of the authentication key input Ki, different random numbers may be input and the same output may be obtained, so this phenomenon is called "collision". [0003] For the COMP128-1 authentication algorithm, "collision" is caused by a special byte pair in a fixed position in the authentication key and a special random number byte pair in the corresponding position in the rando...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/126H04W12/40
CPCH04W12/06
Inventor 杨超
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products