Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method

a subscriber identity module and authentication vector technology, applied in the field of authentication vector generation devices, can solve the problems of the inability to perform a plurality of algorithms, and achieve the effect of not reducing the confidentiality of calculation processing

Inactive Publication Date: 2010-01-14
NTT DOCOMO INC
View PDF9 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a method for securely authenticating a subscriber identity module in a wireless local area network. The method involves generating an authentication vector with a random number field for storing random numbers used in an authentication calculation performed in the subscriber identity module. The vector is then attached with information specifying the algorithm used in the calculation. The method ensures that the confidentiality of the calculation processing is increased, even when the home network uses a triplet as the authentication vector. The technical effect of this method is to enhance the security of the authentication process and prevent decrease in the confidentiality of the calculation processing.

Problems solved by technology

This leads to a decrease in the confidentiality of the calculation processing.
Furthermore, this problem, whereby calculation using an algorithm specified from among a plurality of algorithms cannot be performed, occurs similarly in the secret information, known only to the authentication vector generation device of the home network and the subscriber identity module, used in the calculation performed to improve the confidentiality of the authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method
  • Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method
  • Authentication vector generation device, subscriber identity module, wireless communication system, authentication vector generation method, calculation method, and subscriber authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]The present invention can be understood easily by means of the following detailed description, which is provided with reference to the attached drawings illustrating examples thereof. An embodiment of the present invention will now be described with reference to these attached drawings. Wherever possible, identical parts have been allocated identical reference symbols, and duplicate description thereof has been omitted.

[0026]FIG. 1 shows the constitution of a wireless communication system 1 comprising an HLR 10 (authentication vector generation device) and an SIM 40 (subscriber identity module) according to this embodiment. As shown in FIG. 1, the wireless communication system 1 comprises mobile communication networks 2a, 2b, a wireless local area network 20, a wireless LAN terminal 30 (subscriber side terminal equipment), and the SIM 40. In the wireless communication system 1, the wireless LAN terminal 30 may be connected to the wireless local area network 20 by a wireless LA...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the present invention, a subscriber identity module in a wireless local area network is authenticated using an authentication vector with no decrease in the confidentiality of the calculation processing, even when a triplet is employed as the authentication vector. An HLR of a mobile communication network comprises an attachment unit for attaching to a RAND field of an authentication vector, which is used to authenticate an SIM in a wireless local area network, information specifying calculation information that is constituted by at least one of an algorithm and secret information for use in the authentication calculation. The SIM, which is mounted on a wireless LAN terminal, comprises a calculation information storage unit storing in advance a plurality of the calculation information, a specification unit for specifying the calculation information to be used in the calculation from the plurality of calculation information stored in the calculation information storage unit by referring to information specifying the calculation information, and a calculation unit for performing the calculation on the basis of the specified calculation information.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a divisional of U.S. application Ser. No. 11 / 332,534, filed Jan. 17, 2006, the entire contents of which is incorporated herein by reference, and is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2005-025440, filed Feb. 1, 2005.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to an authentication vector generation device, a subscriber identity module, a wireless communication system, an authentication vector generation method, a calculation method, and a subscriber authentication method.[0004]2. Related Background of the Invention[0005]In IMT-2000 (International Mobile Telecommunication 2000), which is a third generation mobile communication system, and GSM (Global System for Mobile Communications), which is a second generation mobile communication system that is compatible with IMT-2000, authentication has been standardized in the fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04M1/66H04W12/06H04W84/12
CPCH04L63/0853H04W84/12H04W12/06H04W12/0431C10B25/16
Inventor ISHIKAWA, HIDETOSHI
Owner NTT DOCOMO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products