CN102014387B - Wireless terminal and registration and authentication method thereof - Google Patents

Wireless terminal and registration and authentication method thereof Download PDF

Info

Publication number
CN102014387B
CN102014387B CN200910057881.XA CN200910057881A CN102014387B CN 102014387 B CN102014387 B CN 102014387B CN 200910057881 A CN200910057881 A CN 200910057881A CN 102014387 B CN102014387 B CN 102014387B
Authority
CN
China
Prior art keywords
subcard
card
imsi
current
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200910057881.XA
Other languages
Chinese (zh)
Other versions
CN102014387A (en
Inventor
张咏霞
武海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN200910057881.XA priority Critical patent/CN102014387B/en
Publication of CN102014387A publication Critical patent/CN102014387A/en
Application granted granted Critical
Publication of CN102014387B publication Critical patent/CN102014387B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of wireless communication and discloses a wireless terminal and a registration and authentication method thereof, which can ensure multiple telephone numbers in the same SIM (Subscriber Identity Module) or USIM (Universal User Identity Module) card stand by at the same time. In the invention, the wireless terminal comprises one SIM or USIM card which consists of at least two sub-cards, and each sub-card corresponds to one telephone number and comprises an IMSI (International Mobile Subscriber Identity) and a secret key. The method comprises the following steps of: acquiring the IMSI in the current sub-card; initiating network registration by using the acquired IMSI; when an authentication request from the network is received, carrying out authentication treatment by using the secret key in the current sub-card, and sending an authentication result to the network; and after the current sub-card authentication is successful, switching the other sub-card in the SIM or USIM card to be the current sub-card, and repeating the steps.

Description

Wireless terminal and registration thereof and method for authenticating
Technical field
The present invention relates to wireless communication field, particularly the registration of the wireless terminal of one-card multi-number and authentication techniques.
Background technology
Along with the development of mobile communication technology, mobile phone has become one of articles for daily use of people.Most mobile phone only has a subscriber identification module (Subscriber Identity Module is called for short " SIM ") card, correspondingly only has a telephone number.SIM card is exactly a card that includes large scale integrated circuit in inside, the card storage inside contents such as digital mobile phone client's information, encryption key, it can supply global system for mobile communications (Global System for Mobile communication, being called for short " GSM ") network differentiates client identity, and the voice messaging the when client conversed is encrypted.
For the user who often goes to other province to go on business, use the mobile phone of a telephone number can produce higher communication cost.Because mobile phone is understood roaming charges and the toll fee that produces great number after moving to other province.In order to address this problem, produced the mobile phone that has a plurality of SIM card, this mobile phone can have a plurality of telephone numbers.The patent No. is the mobile phone that 5987325 United States Patent (USP) discloses a kind of many smart cards, two SIM card can be installed in a mobile phone, thereby have two telephone numbers to use.
A plurality of SIM card are installed in a mobile phone, and not only the cost of SIM card itself is higher, and the cost of corresponding card reader and deck also can increase.In order to reduce cost, on the present market, common carrier (such as China Mobile) has been released the SIM card of a card even numbers, can have simultaneously two phone numbers on the SIM card.The maximum attraction of this card is, can activate arbitrarily in these two numbers any one by the user, can in different areas, adjust between the different tariff set meal.Such as travelling outside, so number is switched to local number, so just saved the expense of roaming.
Whenever for present mobile phone, the main use of SIM card of a card even numbers is limited in, and access network can only be a number, that is to say that the user can only use one in two numbers to communicate business.Carry out business if the user switches to the another one number, then the business of original number will be terminated.All existing in the situation of phone incoming call in the face of two numbers of user, can't guarantee effective connection of phone like this.
Summary of the invention
The object of the present invention is to provide a kind of wireless terminal and registration thereof and method for authenticating, can allow simultaneously standbies of a plurality of telephone numbers in a SIM or the usim card.
For solving the problems of the technologies described above, embodiments of the present invention provide a kind of wireless terminal register method, this wireless terminal comprises a card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key, and method may further comprise the steps:
Obtain the IMSI in the current subcard;
Use the IMSI that obtains to initiate network registry;
When receiving the authentication request of automatic network, use the key in the current subcard to carry out authentication process, the authentication process result is sent to network;
After the current subcard authentication success, will switch to current subcard for another subcard of card of user's identification, repeat above steps.
Method for authenticating when embodiments of the present invention also provide a kind of wireless terminal incoming call, this wireless terminal comprises a card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an IMSI and key, and method may further comprise the steps:
Wireless terminal read and at least 2 subcards of buffer memory in IMSI;
When receiving beep-page message, if one of IMSI of the IMSI in this beep-page message and institute buffer memory is identical, then respond this beep-page message;
Incoming call is when needing authentication, judges the whether corresponding subcard of this incoming call of current subcard, switches to current subcard if not the corresponding subcard of then should sending a telegram here; Use the key in the current subcard to carry out authentication process to the authentication request of this incoming call, the authentication process result is sent to network.
Embodiments of the present invention also provide a kind of wireless terminal, comprising:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key;
The IMSI acquiring unit is for the IMSI that obtains current subcard;
Registering unit, the IMSI that is used for using the IMSI acquiring unit to obtain initiates network registry;
The authentication process unit is used for using the key in the current subcard to carry out authentication process when receiving the authentication request of automatic network, and the authentication process result is sent to network;
The subcard switch unit is used for after current subcard authentication success, will switch to current subcard for another subcard of card of user's identification, and call IMSI acquiring unit, registering unit and authentication process unit new current subcard is registered.
Embodiments of the present invention also provide a kind of wireless terminal, comprising:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an IMSI and key;
The IMSI reading unit is for the IMSI that reads current subcard;
The subcard switch unit is used for the subcard of appointment is switched to current subcard;
Buffer unit is used for the IMSI of each subcard that buffer memory IMSI reading unit reads;
Receiving element is used for the information that reception comes automatic network;
Transmitting element is used for sending information to network;
The paging processing unit is used for when receiving element is received beep-page message, judges that the IMSI in this beep-page message is whether identical with one of the IMSI of institute's buffer memory in the buffer unit, if it is sends page-response message by transmitting element;
The authentication process unit, be used for when receiving element is received the authentication request of incoming call, judge the whether corresponding subcard of this incoming call of current subcard, switch to current subcard if not then calling the subcard switch unit corresponding subcard of should sending a telegram here, use the key in the current subcard to carry out authentication process, by transmitting element the authentication process result is sent to network.
Embodiment of the present invention compared with prior art, the main distinction and effect thereof are:
To a plurality of subcards in a SIM or the usim card, register successively, succeeding in registration switches to another after one again and registers standby when can realize a plurality of telephone number with a SIM or usim card.
When receiving incoming call, judge the whether subcard of corresponding current activation of this incoming call, if not then switching to subcard corresponding to this incoming call, the information that re-uses in this subcard is carried out authentication, standby when can support a plurality of telephone number with a SIM or usim card, if wireless terminal has enough base band and radio frequency resource, conversation when can also realize a plurality of telephone number.
Only when needing authentication, just send a telegram here and judge with the corresponding relation of subcard, and switch in case of necessity corresponding subcard, can reduce the number of times of the switching of subcard, save system resource.
Further, last registration of the main card in each subcard, current subcard is main card after all subcard is all finished registration.Because the maximum probability that main card is used to so the current subcard after main card finishes as registration can reduce to maximum probability the switching of subcard, is accelerated the response of system, reduce the consumption of system resource.
Description of drawings
Fig. 1 is wireless terminal register method schematic flow sheet in the first embodiment of the invention;
Fig. 2 is the register flow path schematic diagram of SIM card one card even numbers in the second embodiment of the invention;
Fig. 3 be in the third embodiment of the invention when incoming call method for authenticating schematic flow sheet;
Fig. 4 is an example of incoming call handling in the four embodiment of the invention.
Embodiment
In the following description, in order to make the reader understand the application better many ins and outs have been proposed.But, persons of ordinary skill in the art may appreciate that even without these ins and outs with based on many variations and the modification of following each execution mode, also can realize each claim of the application technical scheme required for protection.
For making the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing embodiments of the present invention are described in further detail.
First embodiment of the invention relates to a kind of wireless terminal register method.This wireless terminal comprises a card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number (International Mobile Station Identity is called for short " IMSI ") and key at least.
The card that is used for user's identification can be that SIM card or user serve identification module (User ServiceIdentify Module, be called for short " USIM ") card or Universal Integrated Circuit Card (UniversalIntegratedCircuit Card is called for short " UICC ").
In the third generation (3G) communication system, USIM is the factor that realizes the communication service key.As the person identification module SIM card in the GSM network, USIM brings into play the function of no less important in 3G network.It can store user's personal information safely, and carries out cryptographic algorithm.SIM card and usim card all are anti-tamper smart cards, can guarantee the fail safe of network and private data.Cryptographic algorithm provides a kind of authentication mechanism, only has authentication service afterwards could obtain Internet resources and enjoy network service.But other colourful function of usim card runs far deeper than these.USIM has the physical characteristic identical with SIM card.In the 3G system, usim card can have one or more sets information (such as a card even numbers, or one-card multi-number) of user; And, can implement safe aerial management for specific card image.In addition, usim card can be realized the one or more network applications on the usim card, such as stored value card etc.
UICC is a kind of removable smart card, and it is used for the information such as storing subscriber information, KI, telephone directory, short message.UICC can comprise multiple Logic application, for example SIM, USIM, IP multimedia service identification module (IP Multimedia Service Identity Module is called for short " ISIM ") etc.Certainly UICC can also comprise other application (such as stored value card etc.).
In the present embodiment, the key that comprises in each subcard comprises key identifier Ki (KeyIdentifer).Ki is the key that enciphered data is transmitted between SIM card and the operator.Be appreciated that in each execution mode of the present invention, the middle key of subcard is not limited to Ki, the key that comprises in the subcard also can be other key that is used for authentication, or other title is arranged, or is comprised of a plurality of keys.
The flow process of wireless terminal register method as shown in Figure 1.
In step 101, wireless terminal obtains the IMSI in the current subcard.Current subcard is exactly the subcard that is in state of activation, and for a SIM or USIM, the same time can only have a subcard to be in state of activation, that is to say that the same time only has a subcard can be set as current subcard.
In SIM, USIM or the UICC card, except individual subcard, the part that also has some to share is such as cryptographic algorithm, application software etc.No matter which current subcard is, these parts that share all are operable at any time.
After this enter step 102, wireless terminal uses the IMSI that obtains to initiate network registry.
After this enter step 103, wireless terminal receives the authentication request of automatic network.
After this enter step 104, when wireless terminal receives the authentication request of automatic network, use the key in the current subcard to carry out authentication process.For example, for SIM card, can use Ki to carry out authentication process, relevant cryptographic algorithm also realizes in SIM.
After this enter step 105, wireless terminal sends to network with the authentication process result.
After this enter step 106, wireless terminal judges whether that all subcards all register completely, if it is finishes this register flow path, otherwise enters step 107.In some embodiments of the present invention, also can all register all subcards, but only several subcards of appointment be registered.For example, 4 numbers are arranged in the usim card, but only use wherein three numbers the active user, at this moment only to will with three numbers register just passable.
In step 107, wireless terminal switches to current subcard with another subcard, gets back to above-mentioned steps 101.The switching of subcard can realize with STK.STK is the english abbreviation of SIM Tool Kit, i.e. " user identification application development instrument ".It comprises one group of instruction and is used for the mutual of mobile phone and SIM card, can make like this applet in the SIM card operation card, realizes the purpose of value-added service.STKrefresh function wherein is exactly the application program that the number of SIM card can be changed, thereby can realize a card even numbers.Being appreciated that also can be by other instrument or language (such as the Java language) switching that realizes subcard.
To a plurality of subcards in a SIM or the usim card, register successively, form one of merit and switch to again another and register standby when can realize a plurality of telephone number with a SIM or usim card.
Second embodiment of the invention relates to a kind of wireless terminal register method.
The second execution mode improves on the basis of the first execution mode, and main improvements are: in each subcard of the card of user's identification, be set to main card subcard last register.
Have one in each subcard and be set to main card, other is vice card.In general subcard is the subcard of the main use of user, and for example, the user in Shanghai can be made as main card with the number of Shanghai Local, and the number in other province is made as vice card.Main card and vice card generally are set by the user, and both can set in wireless terminal, also can be set at network side by the attendant when signatory with mobile operator.
Last registration of main card, when all subcard was all finished registration, current subcard was main card.Because the maximum probability that main card is used to so the current subcard after main card finishes as registration can reduce to maximum probability the switching of subcard, is accelerated the response of system, reduce the consumption of system resource.
The example of SIM card one a card even numbers as shown in Figure 2.ME is the meaning of Mobile Equipment (mobile device) among the figure.SIM card is inserted among the ME, has jointly formed mobile phone with ME.
Only insert the SIM card of one one card even numbers in double card double standby mobile phone, this SIM card has two numbers, in order to distinguish conveniently, is called main card, vice card, and switching between main card and the vice card needs by the STK function.
The relevant Ki of encryption for own number of main card and vice card is different, this Ki value can not be read by ME, but SIM card is used Ki and is participated in computing when network authentication, so for same random number, the result that main card and vice card calculate is different.
After the start, obtain first the information such as IMSI of vice card, allow vice card register to network.If network is initiated authentication request, allow so vice card do authentication, with result feedback to network.The success of vice card authentication, vice card successfully is registered to network.
Then switch SIM card number to main card by STK refresh function, obtain the backward network registries of information such as main card IMSI.If network is initiated authentication request, allow so main card do authentication, with result feedback to network.The success of main card authentication, main card successfully is registered to network.
Vice card and main card are successfully registered after the network, just can independently receive Paging (paging) message on the basis of the double-card dual-standby two cover protocol softwares.
Method for authenticating when third embodiment of the invention relates to a kind of wireless terminal incoming call.This wireless terminal of method for authenticating comprises a card that is used for user's identification during this wireless terminal incoming call, and the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, and each subcard comprises an IMSI and key.The card that is used for user's identification can be SIM or USIM or UICC etc.The key that comprises in each subcard comprises key identifier Ki.
The flow process of the 3rd execution mode as shown in Figure 3.
In step 301, wireless terminal read and at least 2 subcards of buffer memory in IMSI.Multiple implementation can be arranged:
A kind of is when wireless terminal starting, reads one by one the IMSI in all subcards.Run through at every turn and the current subcard of buffer memory in IMSI after just next subcard is switched to current subcard, read again, until all subcards were all read.
Another kind is when network registry the IMSI that reads to be cached, after a plurality of subcards are all finished registration with regard to buffer memory naturally and understandably the IMSI of all useful subcards.
In addition, might not be with the IMSI of all subcards buffer memory all, in some period, the user may just use a part of subcard wherein, for example have in the SIM card 3 numbers, but some day child user only set wherein two of use, this moment is as long as the IMSI that the user is set the subcard of use is cached just passable.
After this enter step 302, wireless terminal paging receiving message.When incoming call was arranged, usually network can send beep-page message, and the response of earthing called wireless terminal is known the position of this wireless terminal, so that follow-up processing.
After this enter step 303, after wireless terminal is received beep-page message, judge that the IMSI in this beep-page message is whether identical with one of IMSI of institute buffer memory, if yes then enter step 304, continue paging receiving message otherwise get back to step 302.
In step 304, this beep-page message of wireless terminal responses.
After this enter step 305, wireless terminal is connected with network is vertical.This connection is corresponding with the IMSI in the beep-page message, that is to say that this connection is corresponding with a subcard.
After this enter step 306, wireless terminal receives the authentication request of the incoming call of automatic network by the connection of having set up.
After this enter step 307, wireless terminal is judged the current substep corresponding subcard of whether sending a telegram here, and is the corresponding subcard of incoming call if judge current subcard, then enters step 309, otherwise judges that current subcard is not the corresponding subcard of incoming call, enters step 308.Because the authentication request of incoming call sends over by connection, and connection is corresponding with a subcard, so after receiving authentication request, as long as what consult that this authentication request uses is which connects, just can know which the corresponding subcard of this authentication request has been.
In step 308, the corresponding subcard of should sending a telegram here switches to current subcard.
After this enter step 309, use the key in the current subcard to carry out authentication process to the authentication request of this incoming call.
After this enter step 310, the authentication process result is sent to network.
After this can carry out other processing relevant with incoming call.
When receiving incoming call, judge the whether subcard of corresponding current activation of this incoming call, if not switching to subcard corresponding to this incoming call, the information that re-uses in this subcard is carried out authentication, standby when can support a plurality of telephone number with a SIM or usim card, if wireless terminal has enough base band and radio frequency resource, conversation when can also realize a plurality of telephone number.
Only when needing authentication, just send a telegram here and judge with the corresponding relation of subcard, and switch in case of necessity corresponding subcard, can reduce to greatest extent the number of times of the switching of subcard, save system resource.
Process the situation of two incoming calls in the example of SIM card one a card even numbers as shown in Figure 4.
The main card incoming call, the network requirement authentication.ME judges whether current main card activates, if activate, so just directly allows main card make authentication, and with the result feedback of SIM card authentication to network.If current activation is vice card, need use so the STK refresh function of SIM to switch, switch to main card, then carry out authentication.
Vice card incoming call, the network requirement authentication, ME judges whether current vice card activates, if activate, so just directly allows vice card make authentication, and with the result feedback of SIM card authentication to network.If current activation is main card, need use so the STK refresh function of SIM, switch to vice card, then carry out authentication.
Solved the authentication problem, network just can carry out follow-up incoming call handling operation.
Each method execution mode of the present invention all can be realized in modes such as software, hardware, firmwares.No matter the present invention realizes with software, hardware or firmware mode, instruction code can be stored in the memory of computer-accessible of any type (for example permanent or revisable, volatibility or non-volatile, solid-state or non-solid-state, fixing or removable medium etc.).Equally, memory can for example be programmable logic array (Programmable Array Logic, be called for short " PAL "), random access memory (Random Access Memory, be called for short " RAM "), programmable read only memory (Programmable Read Only Memory, be called for short " PROM "), read-only memory (Read-Only Memory, be called for short " ROM "), Electrically Erasable Read Only Memory (Electrically Erasable Programmable ROM, be called for short " EEPROM "), disk, CD, digital versatile disc (Digital Versatile Disc is called for short " DVD ") etc.
Four embodiment of the invention relates to a kind of wireless terminal.This wireless terminal comprises:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key.The card that is used for user's identification is SI M or USIM or UICC.The key that comprises in each subcard comprises Ki.Subcard switch unit user identifies the application development instrument and realizes that subcard switches.
The IMSI acquiring unit is for the IMSI that obtains current subcard.
Registering unit, the IMSI that is used for using the IMSI acquiring unit to obtain initiates network registry.
The authentication process unit is used for using the key in the current subcard to carry out authentication process when receiving the authentication request of automatic network, and the authentication process result is sent to network.
The subcard switch unit is used for after current subcard authentication success, will switch to current subcard for another subcard of card of user's identification, and call IMSI acquiring unit, registering unit and authentication process unit new current subcard is registered.
The first or second execution mode is the method execution mode corresponding with present embodiment, present embodiment can with the enforcement of working in coordination of the first or second execution mode.The correlation technique details of mentioning in the first or second execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in the first or second execution mode.
Fifth embodiment of the invention relates to a kind of wireless terminal.This wireless terminal comprises:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an IMSI and key.The card that is used for user's identification is SIM or USIM or UICC.The key that comprises in each subcard comprises Ki.Subcard switch unit user identifies the application development instrument and realizes that subcard switches.
The IMSI reading unit is for the IMSI that reads current subcard.
The subcard switch unit is used for the subcard of appointment is switched to current subcard.
Buffer unit is used for the IMSI of each subcard that buffer memory IMSI reading unit reads.
Receiving element is used for the information that reception comes automatic network.
Transmitting element is used for sending information to network.
The paging processing unit is used for when receiving element is received beep-page message, judges that the IMSI in this beep-page message is whether identical with one of the IMSI of institute's buffer memory in the buffer unit, if it is sends page-response message by transmitting element.
The authentication process unit, be used for when receiving element is received the authentication request of incoming call, judge the whether corresponding subcard of this incoming call of current subcard, switch to current subcard if not then calling the subcard switch unit corresponding subcard of should sending a telegram here, use the key in the current subcard to carry out authentication process, by transmitting element the authentication process result is sent to network.
The 3rd execution mode is the method execution mode corresponding with present embodiment, present embodiment can with the enforcement of working in coordination of the 3rd execution mode.The correlation technique details of mentioning in the 3rd execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in the 3rd execution mode.
Need to prove, each unit of mentioning in each wireless terminal execution mode of the present invention all is logical block, physically, a logical block can be a physical location, it also can be the part of a physical location, can also realize that the physics realization mode of these logical blocks itself is not most important with the combination of a plurality of physical locations, the combination of the function that these logical blocks realize is the key that just solves technical problem proposed by the invention.In addition, for outstanding innovation part of the present invention, above-mentioned each the wireless terminal execution mode of the present invention will not introduced not too close unit with solving technical problem relation proposed by the invention, and this does not show that there is not other unit in the said equipment execution mode.
Although pass through with reference to some of the preferred embodiment of the invention, the present invention is illustrated and describes, but those of ordinary skill in the art should be understood that and can do various changes to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (13)

1. wireless terminal register method, it is characterized in that, this wireless terminal comprises a card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key, said method comprising the steps of:
Obtain the IMSI in the current subcard;
Use the IMSI that obtains to initiate network registry;
When receiving the authentication request of automatic network, use the key in the current subcard to carry out authentication process, the authentication process result is sent to network;
After the current subcard authentication success, described another subcard of card for user's identification is switched to current subcard, repeat above steps.
2. wireless terminal register method according to claim 1 is characterized in that, each subcard of described card for user identification, be set to main card subcard last register.
3. wireless terminal register method according to claim 2 is characterized in that, described card for user's identification is that subscriber identification module SIM or user serve identification module USIM or Universal Integrated Circuit Card UICC.
4. wireless terminal register method according to claim 3 is characterized in that, the key that comprises in described each subcard comprises key identifier Ki.
5. wireless terminal register method according to claim 4 is characterized in that, in the step that described subcard switches, realizes that by STK subcard switches.
6. method for authenticating when a wireless terminal is sent a telegram here, it is characterized in that, this wireless terminal comprises a card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key, said method comprising the steps of:
Wireless terminal read and at least 2 subcards of buffer memory in IMSI;
When receiving beep-page message, if one of IMSI of the IMSI in this beep-page message and institute buffer memory is identical, then respond this beep-page message;
Incoming call is when needing authentication, judges the whether corresponding subcard of this incoming call of current subcard, switches to current subcard if not the corresponding subcard of then should sending a telegram here; Use the key in the current subcard to carry out authentication process to the authentication request of this incoming call, the authentication process result is sent to network.
7. method for authenticating when wireless terminal according to claim 6 is sent a telegram here is characterized in that, and is further comprising the steps of after the step of the described beep-page message of response:
Described wireless terminal and network connect, and this connection is corresponding with the IMSI in the described beep-page message;
Described judge current subcard whether the step of the corresponding subcard of this incoming call comprise following substep:
When receiving the authentication request of automatic network, if the used corresponding IMSI of connection of this authentication request is consistent with the IMSI in the current subcard, judge that then current subcard is the corresponding subcard of described incoming call, otherwise judge that current subcard is not the corresponding subcard of described incoming call.
8. method for authenticating when wireless terminal according to claim 7 is sent a telegram here is characterized in that, described card for user's identification is that subscriber identify module card SIM or user serve identification module USIM or Universal Integrated Circuit Card UICC.
9. method for authenticating when wireless terminal according to claim 8 is sent a telegram here is characterized in that the key that comprises in described each subcard comprises key identifier Ki.
10. a wireless terminal is characterized in that, comprising:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key;
The IMSI acquiring unit is for the IMSI that obtains current subcard;
Registering unit, the IMSI that is used for using described IMSI acquiring unit to obtain initiates network registry;
The authentication process unit is used for using the key in the current subcard to carry out authentication process when receiving the authentication request of automatic network, and the authentication process result is sent to network;
The subcard switch unit is used for described another subcard of card for user's identification being switched to current subcard, and calling described IMSI acquiring unit, registering unit and authentication process unit new current subcard is registered after current subcard authentication success.
11. wireless terminal according to claim 10 is characterized in that, described card for user's identification is that subscriber identify module card SIM or user serve identification module USIM or Universal Integrated Circuit Card UICC;
The key that comprises in described each subcard comprises cipher key identifier Ki;
Described subcard switch unit user identifies the application development instrument and realizes that subcard switches.
12. a wireless terminal is characterized in that, comprising:
A card that is used for user's identification, the card that should be used for user's identification comprises at least 2 subcards, the respectively corresponding telephone number of each subcard, each subcard comprises an international mobile station identity number IMSI and key;
The IMSI reading unit is for the IMSI that reads current subcard;
The subcard switch unit is used for the subcard of appointment is switched to current subcard;
Buffer unit is used for the IMSI of each subcard that the described IMSI reading unit of buffer memory reads;
Receiving element is used for the information that reception comes automatic network;
Transmitting element is used for sending information to network;
The paging processing unit is used for when described receiving element is received beep-page message, judges that the IMSI in this beep-page message is whether identical with one of the IMSI of institute's buffer memory in the described buffer unit, if it is sends page-response message by transmitting element;
The authentication process unit, be used for when described receiving element is received the authentication request of incoming call, judge the whether corresponding subcard of this incoming call of current subcard, switch to current subcard if not then calling the described subcard switch unit corresponding subcard of should sending a telegram here, use the key in the current subcard to carry out authentication process, by described transmitting element the authentication process result is sent to network.
13. wireless terminal according to claim 12 is characterized in that, described card for user's identification is that subscriber identify module card SIM or user serve identification module USIM or Universal Integrated Circuit Card UICC;
The key that comprises in described each subcard comprises cipher key identifier Ki;
Described subcard switch unit user identifies the application development instrument and realizes that subcard switches.
CN200910057881.XA 2009-09-07 2009-09-07 Wireless terminal and registration and authentication method thereof Active CN102014387B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910057881.XA CN102014387B (en) 2009-09-07 2009-09-07 Wireless terminal and registration and authentication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910057881.XA CN102014387B (en) 2009-09-07 2009-09-07 Wireless terminal and registration and authentication method thereof

Publications (2)

Publication Number Publication Date
CN102014387A CN102014387A (en) 2011-04-13
CN102014387B true CN102014387B (en) 2013-10-30

Family

ID=43844356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910057881.XA Active CN102014387B (en) 2009-09-07 2009-09-07 Wireless terminal and registration and authentication method thereof

Country Status (1)

Country Link
CN (1) CN102014387B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8755841B2 (en) 2011-07-13 2014-06-17 Mediatek Inc. Apparatuses and methods for providing multi-standby mode of wireless communications using single subscriber identity card with multiple subscriber numbers
CN102821380B (en) * 2012-08-01 2016-06-15 惠州Tcl移动通信有限公司 For realizing method and the mobile terminal of one-card multi-number of mobile terminal
CN103781046B (en) * 2012-10-23 2017-04-19 华为技术有限公司 One-card soft dual-standby incoming call identification method for soft SIM card and communication terminal
JP6415727B2 (en) * 2014-11-21 2018-10-31 コナ アイ カンパニー リミテッド Multi-number service provision method
CN106535148B (en) * 2016-10-24 2021-09-07 北京握奇智能科技有限公司 System and method for realizing simultaneous online of one card and multiple numbers of mobile terminal
CN107318112B (en) * 2017-07-07 2021-04-20 西安万像电子科技有限公司 Registration method of mobile terminal user, mobile terminal and system
CN108322906A (en) * 2017-12-26 2018-07-24 上海数果科技有限公司 The SIM card and its mobile phone and user information method for authenticating of one card multiuser
CN109219037A (en) * 2018-09-19 2019-01-15 东信和平科技股份有限公司 Multiple numbers standby simultaneously implementation method, device and storage medium on smart card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005673A (en) * 2007-01-11 2007-07-25 Ut斯达康通讯有限公司 Method for realizing simultaneously stand-by in double mode mobile phone
CN101146298A (en) * 2007-10-08 2008-03-19 中兴通讯股份有限公司 Method and device for multi-mode mobile terminal to realize call control

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005673A (en) * 2007-01-11 2007-07-25 Ut斯达康通讯有限公司 Method for realizing simultaneously stand-by in double mode mobile phone
CN101146298A (en) * 2007-10-08 2008-03-19 中兴通讯股份有限公司 Method and device for multi-mode mobile terminal to realize call control

Also Published As

Publication number Publication date
CN102014387A (en) 2011-04-13

Similar Documents

Publication Publication Date Title
CN102014387B (en) Wireless terminal and registration and authentication method thereof
US8755841B2 (en) Apparatuses and methods for providing multi-standby mode of wireless communications using single subscriber identity card with multiple subscriber numbers
EP2671398B1 (en) Subscriber identity module provisioning
US8437802B2 (en) Methods and systems for identity management in wireless devices
KR101117712B1 (en) Communication terminal for multiple standby and method for operating thereof
CN100558176C (en) Communication terminal device and communication control method
CN105338515B (en) Data service transmission method and mobile communication equipment
ES2504096T3 (en) Device and method to interface with a cellular telephone network
US20070293192A9 (en) Identification of a terminal to a server
KR20110034167A (en) Apparatus and method for reducing power consumption in multi mode portable terminal
CN104159222A (en) Terminal, identity identification realization method, and authentication method and apparatus
CN111107597B (en) Reliable switching method and device for communication module network
KR20110001027A (en) Structure of smart-card for storing multiple imsi and imsi setting method thereof
KR20160143333A (en) Method for Double Certification by using Double Channel
CN103959703B (en) The method and apparatus for providing access token for managing user
JP2006121334A (en) Information communication terminal and communication management system
KR20100118386A (en) Mobile terminal capable of attaching multiple smart card and method for call processing in the terminal
US20030133425A1 (en) System and method for using CDMA mobile with GSM core infrastructure
CN102123365A (en) Method and system for service transfer handling as well as fixed terminal
CN101321100B (en) Communication method and system, and household base station
CN101415268B (en) Method for automatically identifying double numbers of double-mode mobile terminal
KR100950662B1 (en) A method of certifying smart card for Identification Module using Network
CN102958138A (en) User identifying card automatic selection method and communication device
JP2001127878A (en) Radio communication system and portable telephone set
Alam et al. A Secret Sim Switching Technique to Adapt the Upcoming Technology Trends

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant