Authentication method and device for subscriber identity module card

A customer identification module and authentication technology, applied in the field of biometric identification, can solve the problem of counterfeiting users, and achieve the effect of avoiding theft, ensuring the security of the authentication process, and improving the security.

Inactive Publication Date: 2017-06-13
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the authentication key Ki is hard-written in the SIM card when the user signs the contract, it is not verified, so once it is lost, the attacker can easily impersonate the user to perform other illegal operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for subscriber identity module card
  • Authentication method and device for subscriber identity module card
  • Authentication method and device for subscriber identity module card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The embodiment of the present invention provides an authentication method of a customer identification module card, which is applied to the card writer side of setting SIM card information, such as figure 1 As shown, the processing flow of the method of this embodiment includes the following steps:

[0053] Step 101. Collect biometric information of a user, and extract biometric details from the biometric information.

[0054] When a user signs a SIM card, the card writer needs to first collect some biological features of the user to obtain the user's biological feature information, and then extract the details of the biometric features from the biological feature information. The minutiae of the biological feature can uniquely identify the biological feature information.

[0055] For example, the fingerprint information of the user can be collected by a fingerprint collector as the biometric information of the user; then the minutiae points of the fingerprint can be e...

Embodiment 2

[0093] The embodiment of the present invention provides a card writer, such as image 3 As shown, the card writer includes: a collection and extraction unit 301, a calculation unit 302, and a writing unit 303, wherein,

[0094] The collection and extraction unit 301 is configured to collect and obtain biometric information of the user, and extract minutiae points of biometric characteristics from the biometric information;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose an authentication method for a subscriber identity module card. The method comprises the following steps of collecting biological characteristic information of a user and extracting minutiae of biological characteristics from the biological characteristic information; carrying out binding calculation on the minutiae and a generated authentication key to obtain a fuzzy vault; and writing the fuzzy vault and an international mobile subscriber identification number (IMSI) into an SIM card. The embodiments of the invention disclose an authentication device for the subscriber identity module card.

Description

technical field [0001] The invention relates to the field of biometric identification, in particular to an authentication method and device for a Subscriber Identity Module (SIM) card. Background technique [0002] At present, when the SIM card is authenticated, the prefabricated parameters and keys are used to complete the process of SIM card legality verification through the 2G / 3G / 4G communication protocol. When the user terminal is connected to the network, the International Mobile Subscriber Identification Number (IMSI) and the authentication key Ki are encrypted with the key, and then written into the SIM card, and registered in the User Authentication Center (Authentication Center, AUC) stores the IMSI and the authentication key Ki. When the SIM card performs network login authentication, the Kc key generated by Ki is used for data encryption to complete the authentication with the base station. [0003] The authentication key Ki is the key used to encrypt data when ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 许蓓蓓罗红路晓明
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products