Information memory device for verification and authentication in mobile communications network
A technology of a mobile communication network and a verification method, applied in the directions of security communication devices, security devices, wireless communication, etc., can solve problems such as system attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] 3A, 3B and 3C show the process of mutual authentication according to one embodiment of the present invention. Referring now to Fig. 3A, the step (step 206) of sending the requirements of verification parameters and the IMSI from the MSC / VLR to the verification center AuC (step 206) and the steps 202 and 204 of generating RAND and calculating the verification response are similar to the steps 102, 104 shown in Fig. 2A above , 106 are similar. However, the length of the random number RAND used in this embodiment of the present invention is less than 128 bits. When subscribing, put one called the authentication key K j cert The second secret number with IMSI and verification key K i assigned to users together. certificate key K j cert is stored in the database 32, and can utilize the IMSI as an index with K i were taken out together. In step 204, verify algorithm A 3 is used according to RAND and K i Calculate SRES. In step 205, an authentication algorithm is us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


