Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

282 results about "User identity module" patented technology

Authentication in a telecommunications network

The invention relates to an authentication method intended for a telecommunications network, especially for an IP network. From a terminal (TE1) in the network a first message (RR) containing an authenticator and a data unit is transmitted to the network, the data unit containing information relating to the manner in which the authenticator is formed. For carrying out authentication in the network, the data unit contained in the first message is used for determining a check value, which is compared with the said authenticator. To make it unnecessary for the terminal to perform any complicated and heavy exchange of messages when attaching to the network and for still obtaining the desired security characteristics for use, such an identification unit is used in the terminal which receives as input a challenge from which a response and a key can be determined essentially in the same manner as in the subscriber identity module of a known mobile communications system, a set of authentication blocks is generated into the network, of which each contains a challenge, a response, and a key, whereby the generation is performed in the same manner as in the said mobile communication system, at least some of the challenges contained by the authentication blocks are transmitted to the terminal, one of the challenges is chosen for use at the terminal, and, based on it, a response and key for use are determined with the aid of the terminal's identification unit, in the said first message (RR) the network is notified with the aid of the said data unit of which key corresponding to which challenge was chosen, and the authenticator of the first message and the said check value are determined with the aid of the chosen key.
Owner:CORE WIRELESS LICENSING R L

Roaming communication method based on mobile two-channel virtual card number authentication and roaming communication equipment based on mobile two-channel virtual card number authentication

The invention relates to mobile roaming communication and aims at providing a method and equipment capable of sharing communication resources with communication expense in a roaming destination without replacing a local UIM / SIM (user identity module / subscriber identity module) in a user terminal. The invention provides a roaming communication system based on mobile two-channel virtual card number authentication. The roaming communication system based on the mobile two-channel virtual card number authentication comprises a user terminal, a number server and a roaming destination authentication server, wherein the number server is used for linking a channel of a first communication module of user equipment (UE) to the roaming destination authentication server for browsing a page of the service and serves as a information transfer station between the UE and the roaming destination authentication server; the roaming destination authentication server is used for selecting a virtual mobile user number, sending authentication parameters of the system to the UE and comparing a returned authentication operation result which carries a UE identity authentication algorithm module the same with an authentication data storage, the same terminal secret key and corresponding sequence code and can assist virtual mobile user number authentication. The method and the equipment provided by the invention is applicable to the mobile roaming communication.
Owner:熊文俊

Method for supporting subscriber's service provider change restriction policy in mobile communications and apparatus therefor

The present invention relates to a method and an apparatus for employing an embedded subscriber identity module (hereinafter referred to as eSIM) to apply a policy such as a subsidy policy to, activate, deactivate, add to, update, and delete a user profile in a mobile communications network. The present invention enables a mobile device to determine whether to host the policy of a new service provider when it changes the present service provider or to perform a lock for prohibiting the policy change, and to change the profile related to the determination. The present invention also enables a mobile device to replace the policy related to the service provider by applying the policy, or to employ eSIM so as to activate, deactivate, revise, add, or delete the rules of the policy related to the service provider. The present invention provides various examples of hosting and applying the policy and various examples of activating, deactivating, revising, adding, deleting the policy rules so as to make eSIM identify the subscriber as the existing subscriber identity module. The invention also enables the device or eSIM to be reused when changing the service provider throughout the life cycle thereof without limiting the use of eSIM to a single service provider. The invention also provides a method for locking the policy applied per service provider, and the use of eSIM when changing to another service provider by the policy per service provider. The present invention also provides a method for checking the criteria of decision and verifying the power of decision when administering the policy rules and eSIM through deleting, adding, revising, activating, and deactivating the profile management plan and policy rules by applying the service provider's policy. Thus the present invention enables the device to host a new service provider's policy for communicating therewith when changing from the existing service provider to the new service provider, or when the government changes the service provider for an M2M device related to the electricity, infrastructure, etc. under an environment such as EUTRAN (Evolved Universal Terrestrial Radio Access Network) or UTRAN (Universal Terrestrial Radio Access Network)/GERAN(GSM/EDGE Radio Access Network). The present invention also is advantageous in that if the change of a service provider is not allowed according the policy of the existing service provider, the information related to communication and the security information are set revised safely by locking, thus enhancing the communication efficiency and security. The present invention also enables the device to verify the power of the user or to revise safely the information of eSIM for adding, revising, deleting, activating, and deactivating the policy rules for managing the operation profile for administration of the policy of the service provider under an environment such as EUTRAN(Evolved Universal Terrestrial Radio Access Network) or UTRAN(Universal Terrestrial Radio Access Network)/GERAN(GSM/EDGE Radio Access Network), thus enhancing the communication efficiency and security.
Owner:SAMSUNG ELECTRONICS CO LTD

Mobile terminal, access control management device, and access control management method

A mobile terminal (200) comprises an application execution unit (240) configured to execute an application program; an access control rule management unit (270) configured to retain an access control rule defining whether the application program has an access authorization to a confidential resource in the mobile terminal and a determining unit; an access control rule query unit (220) configured to acquire, from an external device, the access control rule by designating at least one of an identifier of a user identity module installed in the mobile terminal and an identifier of the mobile terminal, and to retain the acquired access control rule in the access control management unit; a query requirement determination unit (260) configured to determine whether to update the access control rule when the application program makes an access to the confidential resource, and to update the access control rule; an authorization management unit (230) configured to determine whether the application program has the access authorization based on the access control rule; and a confidential resource management unit (250) configured to determine whether to permit an access request to the confidential resource by the application program, based on a result of the determination of the authorization management unit (230).
Owner:NTT DOCOMO INC

System and method for authentication in a mobile communications system

InactiveUS20060073811A1Simply and smoothly authenticatedEasily and smoothly authenticatedUnauthorised/fraudulent call preventionEavesdropping prevention circuitsNetwork terminationCommunications system
The present invention provides an authentication method and apparatus for authenticating an identity of a subscriber attached to a network. According to the invention, in a network terminal, a subscriber identity module is used so that a response is obtained as a result of a challenge given to the identity module as input. A special security server in the network is also used so that when a terminal attaches to the network, a message of a new user is transmitted to the security server. Subscriber authentication information corresponding to the new user is fetched from the mobile communications system to the network, wherein the authentication information includes at least a challenge and a response. Authentication is performed based on the authentication information obtained from the mobile communications system by transmitting the challenge to the terminal through the network, by checking at the terminal that the challenging is unique from challenges used in previous authentication exchanges, by generating, if the challenge is unique, a response from the challenge in the identity module of the terminal and by comparing the generated response with the response received from the mobile communications system.
Owner:NOKIA CORP

Bridging between a mobile cellular telephone network and a data, voice over internet protocol (VOIP) network

A method for providing telephone communications in a system including a wide area data network and a wireless cellular mobile telephone network. A local cellular mobile telephone operator serves the wireless cellular mobile telephone network by providing a radio communications interface within a local region. The local cellular mobile telephone operator issues a subscriber identity module (SIM) to a user of the wireless cellular mobile telephone network. A communications terminal interfaces to the wide area data network using a radio interface to a base transceiver station (BTS) of the wireless cellular mobile telephone network within the local region. The communications terminal includes a communications module for handling a telephone communication through the wide area data network and the wireless cellular mobile telephone network. The communications terminal includes a subscriber identity module (SIM) emulator. A client computer is attached to the wide area data network at a remote site outside the local region. The client computer includes a subscriber identity module (SIM) reader. Telephone communications are provided by (a) inserting the SIM card into the SIM reader (b) transferring SIM identification data of the SIM card to the terminal over the wide area data network and (c) emulating the SIM card based on the SIM identification data. The emulation is performed by the emulator at the communications terminal. The SIM data is provided to the wireless cellular mobile telephone network operator within the local region over the radio communications interface.
Owner:PATARKAZISHVILI PINHAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products