Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system

A technology for cellular mobile communication and mobile users, which is applied in the field of automatic two-way authentication of user and base station identities, which can solve problems such as user fake base station attacks, network security loopholes, and one-way authentication mechanism, and achieve the effect of guaranteeing benefits.

Inactive Publication Date: 2005-06-22
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the second-generation and third-generation digital cellular mobile communication systems, the authentication mechanism used in registration is generally one-way, that is, only supports the authentication of users by the network system, and does not support the authentication of users by the network system, so that users may Can b...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system
  • Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system
  • Method of bidirectional authentication during subscriber switch in digital cellular mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The two-way identification method when the user of the digital cellular mobile communication system switches is realized by the execution of the identification software. The identification software is respectively stored at both ends of the communication. The specific physical storage location is; mobile users such as mobile phones are stored in the SIM card Inside, the identification software at the base station is stored in the base station controller. Any one of the two parties can initiate a two-way authentication request, and the two-way authentication process during switching is quickly and automatically completed between the mobile phone, the base station controller and the AAA server.

[0022] If the user and the mobile phone move from one working sector of the same base station to another sector, the two-way identification software of the present invention in the SIM card of the mobile phone and the two-way identification software of the present invention in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a bidirection identification method for digital cellular mobile communication, which contains normal switching complete bidirection identification method and emergency switching simple bidirection identification method in different sector of same base station and different base station of same dynamic field. Said invention realizes the safety communication in user switching and effectively guarantees user and network company benefit.

Description

technical field [0001] The invention relates to a method for automatically bidirectionally identifying the identity of a user and a base station when the user moves and switches in a digital cellular mobile communication system. Background technique [0002] In the second-generation and third-generation digital cellular mobile communication systems, the authentication mechanism used in registration is generally one-way, that is, only supports the authentication of users by the network system, and does not support the authentication of users by the network system, so that users may Will be attacked by fake base stations. Moreover, the current digital cellular mobile communication system does not provide a handover authentication mechanism when the user is handed over, so there is a large security loophole for both the user and the network during the handover, so that the interests of both parties are not effectively protected. Contents of the invention [0003] The purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/03H04W12/06
Inventor 谢宇虞忠辉赖增桂
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products