Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication control method and system of subscriber identity module card

A technology of user identification and control methods, which is applied in the field of authentication control of user identification cards, can solve the problems of low security and confidentiality in the authentication process, and achieve the effect of improving security and confidentiality

Active Publication Date: 2021-11-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an authentication control method and system for a user identification card. By deploying an authentication control application program on a mobile terminal, the mobile terminal can call the authentication control application program set in the mobile terminal under the instruction of the authentication control application program. The application protocol data unit of the user identification card, so that the user identification card can execute the authentication process according to the authentication control information, so as to solve the problem of low security and confidentiality of the authentication process in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication control method and system of subscriber identity module card
  • Authentication control method and system of subscriber identity module card
  • Authentication control method and system of subscriber identity module card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authentication control method and system for a subscriber identity module card, and the method comprises the steps: deploying an authentication control application program at a mobile terminal, so that the mobile terminal can call an application protocol data unit instruction of the subscriber identity module card arranged in the mobile terminal under the indication of the authentication control application program, the user identity identification card is controlled to execute the authentication process through the authentication control information carried by the application protocol data unit instruction, the authentication process of the user identity identification card can be controlled by an authentication control application program deployed by the mobile terminal, and the user identity identification card is prevented from leaking important information in the authentication process; and thus, the security and confidentiality in the authentication process are improved.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of identity authentication, in particular to an authentication control method and system for a user identity identification card. Background technique [0002] The rapid development of mobile network communication technology has greatly improved people's communication level. Internet users can use the Internet for video calls, voice chats, phone calls, text messages, and more. Usually, before using the network, the user needs to apply for a subscriber identification (Subscriber Identification Module, SIM) card at the network operator, and then authenticate the SIM to log in to the network. The signal network can be accessed by using the SIM, and the data information during the use of the SIM card by the user will also be stored in the SIM card. [0003] In related technologies, each SIM card corresponds to an International Mobile Subscriber Indentity (IMSI) and an authentication k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/40H04W12/72
CPCH04W12/06H04W12/40H04W12/72
Inventor 胡昌玮张元冰袁世强
Owner CHINA UNITED NETWORK COMM GRP CO LTD