Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal and its serial authentication method under wcdma network

A mobile terminal and authentication technology, applied in electrical components, security devices, wireless communications, etc., can solve the problems of secondary authentication failure in the CS domain, and achieve the effects of improving the authentication success rate, simple implementation, and low implementation cost.

Active Publication Date: 2020-10-13
ASR MICROELECTRONICS CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the mobile terminal processes the second authentication request sent by the network side through the CS domain, the received SEQ NET_CS Still better than the current SEQ MS Much smaller, which leads to the failure of the second authentication of the CS domain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and its serial authentication method under wcdma network
  • Mobile terminal and its serial authentication method under wcdma network
  • Mobile terminal and its serial authentication method under wcdma network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] see figure 2 Embodiment 1 of the method for serial authentication of a mobile terminal under a WCDMA network provided by this application includes the following steps.

[0044] Step S210: the network side sends an authentication request to the mobile terminal through the PS domain or the CS domain. Which carries RAND and AUTN. The AUTN contains the SQN NET and MAC NET , the subscript NET indicates that it is generated by the network side.

[0045] Step S220: After receiving the authentication request from the network side through the PS domain or the CS domain, the mobile terminal determines whether there is an authentication request from another domain that is being processed. If so, the newly received authentication request is cached, and the mobile terminal starts to process the cached authentication request after the authentication request of another domain currently being processed is processed. If not, the mobile terminal starts processing the newly received...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a serial authentication method for a mobile terminal under a WCDMA network. The network side sends an authentication request to the mobile terminal through the PS domain or the CS domain. If the first network parameter is equal to the first local parameter, the USIM card judges the second network parameter and the second local parameter according to a synchronization check rule. If the check is passed, the mobile terminal sends an authentication success message to the network side. If the check fails, the mobile terminal replies to the network side with an authentication failure message with specific failure reasons and parameters. After the network side receives the above-mentioned authentication failure message of the first authentication, it will recalculate the authentication quintuple, and then the network side initiates a second authentication request through the same field. The present application adopts a serial processing method for the authentication requests of the PS domain and the CS domain, which greatly improves the success rate of authentication of the mobile terminal to the network side.

Description

technical field [0001] The present application relates to a method for a mobile terminal to authenticate a WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access) network side. Background technique [0002] The 3G mobile communication network represented by WCDMA adopts two-way authentication. On the one hand, the network side authenticates the mobile terminal (UE, User Equipment, user equipment), and on the other hand, the mobile terminal authenticates the network side. [0003] A mobile terminal supporting a WCDMA mobile communication network has a UICC (Universal Integrated Circuit Card, Universal Integrated Circuit Card) card, and a built-in USIM (UMTS subscriber identity module) application, etc. For ease of description, the USIM card will be used in this document to represent the USIM application in the UICC card of the mobile terminal. [0004] see figure 1 , the existing mobile terminal authentication method under the WCDMA network in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/06H04W12/065H04W12/40
CPCH04W12/40H04W12/065
Inventor 张凤霞丛丹
Owner ASR MICROELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products