Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and mobile terminal for securely transmitting a mobile subscriber identifier

A mobile user identification, mobile terminal technology, applied in security devices, radio/induction link selection arrangements, electrical components, etc., can solve problems such as theft

Inactive Publication Date: 2006-08-09
LG ELECTRONICS INC
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the IMSI is not encoded, it is easily stolen by a third party when it is sent over the air interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and mobile terminal for securely transmitting a mobile subscriber identifier
  • Method and mobile terminal for securely transmitting a mobile subscriber identifier
  • Method and mobile terminal for securely transmitting a mobile subscriber identifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The inventors herein disclose a method of transmitting a mobile subscriber identifier with improved security using a combination of a public key and a secret key (or private key).

[0028] The method for securely sending a mobile user identifier according to an embodiment of the present invention is described below with reference to FIG. 2 .

[0029] The method shown in FIG. 2 is roughly divided into two parts: an encoding / transmission part (step S30) and a reception / decoding part (step S40). More specifically, the method shown in FIG. 2 includes encoding the mobile user identifier by the mobile terminal and sending the mobile user identifier to the mobile communication system (step S30), and decoding the mobile user identifier by the mobile communication system and Its validity is determined (step S40).

[0030] image 3 The encoding and sending process of step S30 is shown in more detail, and Figure 4 The decoding and validity determination process of step S40 is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a method for securely transmitting a mobile subscriber identifier in a mobile communications system. The method includes coding a mobile subscriber identifier with a public key, generating a first message authentication code (MAC), transmitting the coded mobile subscriber identifier and the first MAC, receiving the mobile subscriber identifier and the first MAC, decoding the coded mobile subscriber identifier, and determining the validity of the decoded mobile subscriber identifier.

Description

[0001] This application claims the benefit of Korean Patent Application No. 10-2005-08221 filed on Jan. 28, 2005, which is hereby incorporated by reference in its entirety. technical field [0002] The present invention relates to a method and a mobile terminal for securely transmitting a mobile subscriber identifier in a mobile communication system. Background technique [0003] IMT-2000 is a global standard for third generation (3G) wireless communications utilizing Wideband Code Division Multiple Access (WCDMA) radio interfaces and Global System for Mobile Communications (GSM) infrastructure, including General Packet Radio Service (GPRS). GPRS is an asynchronous communication service that utilizes Mobile Switching Center (MSC), Gateway Mobile Switching Center (GMSC), Service GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) in its core network. The radio access network includes the UMTS Terrestrial Radio Access Network (UTRAN), which includes Node Bs and a Rad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/32H04W88/02
CPCH04L63/0414H04L63/123H04W12/10H04W88/02H04L63/0442H04W12/033H04W12/72H04W12/40H04W12/106
Inventor 林良泽
Owner LG ELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products