Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing right discriminating to network by terminal in CDMA network

A network authentication and authentication technology, applied in the field of authentication, can solve the problems that users cannot use mobile terminals normally, damage the security of mobile terminals, and unfavorable terminal anti-theft, so as to achieve small changes, prevent theft, and upgrade costs small effect

Inactive Publication Date: 2006-08-02
HUAWEI TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After these terminals access the fake base station, illegal users can obtain user terminal information and modify user terminal information, so that users cannot use the mobile terminal normally. In addition, illegal users can even send viruses to user terminals. , so as to perform some illegal operations on the user's terminal, causing greater damage to the user
[0006] Moreover, if the user's terminal is lost, since there is no authentication of the terminal to the network, the illegal user who may steal the terminal can use the terminal normally in the network in other regions, which is not conducive to the anti-theft of the terminal, and thus also damages the mobile network. Terminal Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing right discriminating to network by terminal in CDMA network
  • Method for realizing right discriminating to network by terminal in CDMA network
  • Method for realizing right discriminating to network by terminal in CDMA network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] The present invention uses the existing base station inquiry process to realize the authentication of the mobile terminal (MS) to the network, so as to be compatible with the existing communication protocol to the greatest extent, so as to facilitate the practical application of the scheme of the present invention.

[0037] According to the present invention, it is necessary to improve the existing CDMA terminal, specifically including requiring the terminal to independently initiate the base station inquiry process in the control channel and the traffic channel, and the terminal to be able to configure various data required for network authentication. For existing base stations, it is required to be able to receive and process independent base station inquiry messages. For the existing HLR / AC, no modification is required.

[0038] Re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for realizing right certification of network by terminal in CDMA network includes generating a random number in mobile terminal first, then sending random number to MSC / VLR in CDMA network ;obtaining calculation result of right certification by MSC / VLR according to said random number then returning calculation result of right certification to mobile terminal, comparing received calculation result of right certification with right certification calculation result obtained by itself as per random number by mobile terminal and judging that network is legal if the two are identical or otherwise judging that network is illegal .

Description

technical field [0001] The invention relates to an authentication technology in a code division multiple access (CDMA) communication system, in particular to a method for realizing terminal-to-network authentication in a CDMA network. Background technique [0002] Along with the progress of science and technology and the development of society, mobile communication becomes more and more popular, and mobile phone has become an indispensable part in people's daily life and work. Correspondingly, the security of mobile terminals has also attracted more and more attention. [0003] At present, in the CDMA network, in order to ensure the security of the mobile terminal, an authentication technology is proposed. That is, when a mobile terminal accesses the network, the network authenticates the mobile terminal to verify whether the mobile terminal is a legitimate mobile terminal, and the network only provides services to legal mobile terminals. Through this authentication, if an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W12/06H04W12/30
Inventor 王备王正伟董昆阳黄天振郭平
Owner HUAWEI TECH CO LTD