An improved sim card and mobile communication identification method and system
A technology of identity recognition and mobile communication, applied in the field of mobile communication, can solve the problem of SIM card security communication cracking, etc., and achieve the effect of preventing the risk of being cracked and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054]In the mobile communication identification system based on the improved SIM card in this embodiment, when a customer goes to the mobile communication network to access the network, the customer is assigned a customer phone number (MSISDN), an international mobile subscriber identity number (IMSI), and a SIM card. card. Write IMSI and other customer information such as various cryptographic algorithms into the customer's SIM card through the card writer.
[0055]There is a key issuing server in the mobile communication network, and the key issuing server is equipped with a true random number generator. From the true random number generated by the true random number generator, a specified number of true random number keys are taken out. The number key is the true random number key issued this time. And write the true random number key into the customer's SIM card. The true random number key is directly stored in the SIM card in plain text, and cannot be taken out through any means....
Embodiment 2
[0066]Compared with Embodiment 1, the SIM card in this embodiment is equipped with a true random number generator chip. After receiving the true random number key from the mobile communication network, the SIM card generates it through its internal true random number generator chip. A true random number encryption key K, and use the true random number encryption key K to encrypt the true random number key into a true random number key in ciphertext form. The true random number key in the form of cipher text can be stored in the memory of the mobile terminal or in an extended storage area of the mobile terminal or in a data storage area in the SIM card. At the same time, the true random number encryption key K will be stored in the SIM card for use in decryption.
[0067]The authentication process of the mobile communication network to the customer SIM card will be given below according to the traditional authentication method, and the authentication process of the customer SIM card t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

