Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication of mobile communication networks

A technology of mobile communication network and network, applied in the field of mobile communication network

Inactive Publication Date: 2007-05-30
TELEFON AB LM ERICSSON (PUBL)
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in many cases this reverse authentication is not required, there are some occasions when the mobile station needs to ensure that the mobile network is non-hostile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication of mobile communication networks
  • Authentication of mobile communication networks
  • Authentication of mobile communication networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Figure 1 schematically depicts part of a conventional GSM network. This network is essentially divided into a core network part 20 and an access part, also called Base Station Subsystem BSS 10 . Elements of the core network 20 shown in the figure include a Mobile Switching Center or MSC 202, an associated Home Location Register HLR 201 and a Visitor Location Register VLR 204. The function and structure of these conventional GSM architecture elements are known to those skilled in the art and will not be described in more detail here. Although not shown in the figure, those skilled in the art will appreciate that the core network portion may include access to other mobile and fixed line networks, such as ISDN and PSTN networks, packet and circuit switched packet, through one or more gateway nodes Data networks such as Intranets, Extranets, and the Internet. Also shown in the figure is an authentication center AUC 205, which is connected to the home location register HLR...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile station is adapted to communicate with a core network portion of a mobile communications network via an unlicensed radio access network. The mobile station has a SIM card adapted to generate a unique response word using at least a key unique to the mobile station and a fixed length random number. The mobile station includes processing circuitry and unlicensed radio interface circuitry coupled to the processing circuitry. This circuitry is adapted to generate a fixed-length random number, calculate a first response word with the SIM card on the basis of the generated random number, formulate and transmit an authentication request to the unlicensed radio access network containing the fixed-length random number, receive an authentication response from the unlicensed radio access network containing a second response word, and compare the calculated first response word with the received second word to authenticate said core network. In this manner, mobile station is able to authenticate the network with an existing second generation SIM card and with minimum modification of its operation.

Description

technical field [0001] The invention relates to authentication between a mobile station and a mobile communication network. The invention is particularly applicable to mobile communication networks accessed via unlicensed radio access networks. Background technique [0002] In many second generation mobile networks, such as GSM networks, authentication mechanisms provide a way for the network to authenticate mobile stations attempting to connect to the network. Existing GSM authentication mechanisms are based on challenge-response exchanges between the network and the mobile station. [0003] The Mobile Services Switching Center MSC initiates authentication procedures when required, eg when receiving a location update message, a CM service request for a mobile originated call, an SMS or paging response from a mobile station, etc. The Authentication Center (AUC) connected to the Mobile Services Switching Center MSC via the Home Location Register HLR holds the mobile station...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04L12/56H04L29/06H04W12/06H04W88/06
CPCH04L63/0869H04W88/06H04L63/0853H04W12/06
Inventor T·奈兰德J·威克伯格L·P·奥曼
Owner TELEFON AB LM ERICSSON (PUBL)