Unlock instant, AI-driven research and patent intelligence for your innovation.

Information memory device for verification and authentication in mobile communications network

A technology of a mobile communication network and a verification method, applied in the directions of security communication devices, security devices, wireless communication, etc., can solve problems such as system attacks

Inactive Publication Date: 2006-03-01
FRANCE TELECOM SA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the above system is vulnerable to the fact that in order to obtain the secret key K i various attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information memory device for verification and authentication in mobile communications network
  • Information memory device for verification and authentication in mobile communications network
  • Information memory device for verification and authentication in mobile communications network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] 3A, 3B and 3C show the process of mutual authentication according to one embodiment of the present invention. Referring now to Fig. 3A, the step (step 206) of sending the requirements of verification parameters and the IMSI from the MSC / VLR to the verification center AuC (step 206) and the steps 202 and 204 of generating RAND and calculating the verification response are similar to the steps 102, 104 shown in Fig. 2A above , 106 are similar. However, the length of the random number RAND used in this embodiment of the present invention is less than 128 bits. When subscribing, put one called the authentication key K j cert The second secret number with IMSI and verification key K i assigned to users together. certificate key K j cert is stored in the database 32, and can utilize the IMSI as an index with K i were taken out together. In step 204, verify algorithm A 3 is used according to RAND and K i Calculate SRES. In step 205, an authentication algorithm is us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method of authentication using an information storage means, comprising the steps of: receiving a message comprising an authentication challenge and determining a characteristic of said message, calculating an authentication response based on said authentication challenge, an authentication input parameter and an authentication algorithm, said method being characterised by the steps of: retrieving one authentication input parameter from a number of input parameters stored on said information storage means or one authentication algorithm from a number of algorithms stored on said information storage means in response to said characteristic; and responding to said authentication challenge by using said retrieved authentication input parameter or algorithm

Description

technical field [0001] The present invention relates to an authentication method, in particular, but not exclusively, the invention relates to an authentication method in a mobile communication network. Background technique [0002] In the known conventional GSM (Global System for Mobile Communications) system, each mobile station (eg a mobile telephone handset) is equipped with a SIM which is inserted into the mobile station in order to allow the mobile station to receive services in the GSM network. [0003] A typical SIM includes: a microprocessor; memory elements, including permanent memory (such as ROM), non-volatile rewritable memory (such as EEPROM) and volatile memory (such as RAM); and contacts for forming Data transfer interface between SIM and mobile station. [0004] The following description will be made with reference to Figs. 1, 2A and 2B. Figure 1 shows the basic structure of the GSM system. The GSM standard also specifies the network's authentication proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04W12/06
CPCH04L9/3273H04L2209/80H04L51/22H04W12/06H04L51/38H04L9/3263H04L63/0823H04W12/40H04W12/122H04W12/126H04L51/42H04L51/58
Inventor 马克·雷蒙德·格林蒂莫西·约翰·海斯姆菲利普·胡克
Owner FRANCE TELECOM SA