CN101466096A - Method and system for triggering synchronous failure of authentication process - Google Patents

Method and system for triggering synchronous failure of authentication process Download PDF

Info

Publication number
CN101466096A
CN101466096A CNA2007101797393A CN200710179739A CN101466096A CN 101466096 A CN101466096 A CN 101466096A CN A2007101797393 A CNA2007101797393 A CN A2007101797393A CN 200710179739 A CN200710179739 A CN 200710179739A CN 101466096 A CN101466096 A CN 101466096A
Authority
CN
China
Prior art keywords
value
core network
sqn
authentication
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101797393A
Other languages
Chinese (zh)
Other versions
CN101466096B (en
Inventor
肖伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Mobile Communications Equipment Co Ltd
Original Assignee
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Mobile Communications Equipment Co Ltd filed Critical Datang Mobile Communications Equipment Co Ltd
Priority to CN2007101797393A priority Critical patent/CN101466096B/en
Publication of CN101466096A publication Critical patent/CN101466096A/en
Application granted granted Critical
Publication of CN101466096B publication Critical patent/CN101466096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a synchronous failed method of triggering authentication process, which comprises: an indexed (IND) value to be sent down is calculated according to serial number (SQN) obtained by twice triggering authentication flow; the serial-number SEQ value corresponding to the IND in a universal subscriber identification module (USIM) file in a mobile station can be modified according to the calculated IND value; and the authentication flow synchronous failure can be obtained in the third triggering authentication flow. The invention also discloses a synchronous failed system of triggering authentication process. Adopting the method and the system can realize a test that the triggering authentication flow is failed due to synchronous failure.

Description

Method and system for triggering synchronization failure of authentication process
Technical Field
The invention relates to an authentication testing technology in a mobile communication system, in particular to a method and a system for testing synchronous failure of a triggering authentication process.
Background
In a mobile communication system, whether a second generation (2G) or a third generation (3G) system, a Mobile Station (MS) needs to authenticate first when starting up to perform location update or initiate a call, and after authentication, the system considers a legitimate user to provide service, and rejects to provide service to an illegitimate user system. In the 2G system, the network mainly authenticates the user; in the 3G system, not only the authentication of the network to the user is included, but also the authentication of the user to the network is included.
In the prior art, the basic authentication process of 2G and 3G systems mainly includes four processes as shown in fig. 1, and taking a location update process in which a user in the 3G system starts up and successfully performs international mobile subscriber identity attachment (IMSIATTACH) as an example, a specific authentication processing process includes:
step 101: after receiving the message of mobile station startup through IU port, mobile switching center (service general packet radio service support node)/visitor location register (MSC (SGSN)/VLR) judges whether the user is a new user or not according to IMSI number, if so, then initiates Authentication Data Request to home location register/Authentication center (HLR/AUC), the Request message carries the IMSI number of the user.
Step 102: after receiving the Authentication Data Request message, HLR/AUC returns Authentication Data Response message carrying a series of ordered Authentication parameter sets to MSC (SGSN).
Here, in case of the 2G system, each authentication parameter set is a triplet including a random number (RAND), a Symbol Response (SRES), and a secret Key (KC); in the case of the 3G system, each authentication parameter set is a five-tuple including a network challenge random number (RAND), a user response expected value (XRES), a Ciphering Key (CK), an Integrity Key (IK), and a network identity verification flag (AUTN).
Step 103: after receiving the response message, MSC (SGSN) extracts a group of Authentication parameters arranged at the front, carries RAND and AUTN in the User Authentication Request message User Authentication Request and sends the same to MS, and also carries the key identification code (KSI) generated by MSC (SGSN) and used for identifying CK and IK in the Authentication group in the User Authentication Request message.
Step 104: after receiving the User Authentication Request message, the MS firstly verifies the AUTN, which is actually the Authentication process of the MS to the service network, and if the verification is successful, the MS calculates the RES, the CK and the IK, wherein the CK and the IK are stored together with the received KSI to form a security context; then, the MS will carry the RES in a User Authentication Response message, User Authentication Response, back to the msc (sgsn). If the MS fails to authenticate the network, a User Authentication Reject message (User Authentication Reject) is sent to MSC (SGSN).
It can be seen from the above flow that the authentication encryption of the 3G user is the same as that of the 2G user, but the authentication set of the 2G user is a triplet, and the authentication set of the 3G user is a quintet, and the maximum difference between the 3G authentication and the 2G user is that an AUTN value is added, and the AUTN is used for the mobile station to authenticate the network. In the 3GPP protocol, the definitions of AUTN are:
<math> <mrow> <mi>AUTN</mi> <mo>=</mo> <mi>SQN</mi> <mo>&CirclePlus;</mo> <mi>AK</mi> <mo>|</mo> <mo>|</mo> <mi>AMF</mi> <mo>|</mo> <mo>|</mo> <mi>MAC</mi> </mrow></math>
wherein, SQN is a sequence number, and is composed of a sequence number set value (SEQ) and an Index Number (IND), and SQN is SEQ | IND; AK is an anonymous Key (Anonymity Key); AMF is authentication management Field (authentication Field); the MAC is a Message Authentication Code (Message Authentication Code).
The synchronization between the MS and the network is achieved through the SQN, the generation principles of the SEQ, the IND and the SQN are respectively given in the 3GPP protocol, and each core network manufacturer determines how to realize the synchronization specifically by each manufacturer as long as the manufacturer is under the specified principle, so the realization mechanisms of each manufacturer are different.
In the prior art, although there is a clear specification on the test items in the row label for the test of the authentication process, such as Failure of the authentication process, the Failure reason being synchronization Failure (SYNCH Failure), etc., how to specifically perform the test of Failure of the authentication process, how to implement the test of Failure of triggering the authentication process, and the Failure reason being synchronization Failure, and a corresponding test method is not disclosed at present.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and a system for triggering synchronization failure in an authentication process, which can implement a test that the authentication process fails and the failure reason is synchronization failure.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a method for triggering synchronization failure in an authentication process, which comprises the following steps:
calculating an index number IND value to be issued by a core network according to the sequence number SQN obtained by triggering the authentication process twice, and modifying a sequence number SEQ value corresponding to the IND in a universal subscriber identity module USIM file of the mobile station according to the calculated IND value; triggering the authentication process for the third time to obtain the synchronization failure of the authentication process.
The triggering authentication process is triggered by starting a mobile station, or by initiating a circuit domain or packet domain service, or by performing attachment triggering of a general packet radio service.
In the above scheme, the SQN is obtained from the USIM file of the mobile station itself. The calculation of the IND value to be issued is specifically: the added value of the IND value is calculated according to the SQN obtained twice, then the sum of the previous IND value and the added value is calculated, and then the sum is processed by a module 32 to obtain the IND value to be issued by the core network. Wherein, the modified SEQ value is specifically: modifying the SEQ value corresponding to the IND value to be issued in the USIM file of the mobile station into a value larger than the SEQ value to be issued by the core network; or modified to a 28 th power value that is 2 less than the next time the value of SEQ is to be delivered by the core network.
The authentication process synchronization failure is specifically: and the mobile station compares the SQN issued by the core network for the third time with the modified SEQ value, and if the SQN issued by the core network for the third time is smaller than the modified SEQ value or is greater than the modified SEQ value by the power of 28 of 2, the mobile station returns authentication failure to the core network, and the failure reason is synchronization failure.
In the above scheme, after the authentication fails, the method further includes: the mobile station reports authentication synchronization failure to the core network, wherein the authentication synchronization failure carries the SQN of the current mobile station side, and the core network calculates new SQN issuing according to the SQN reported in the mobile station synchronization failure and triggers a secondary authentication process.
The invention also provides a system for triggering the synchronization failure of the authentication process, which comprises a mobile station and a core network, wherein the mobile station comprises an authentication process triggering module, a parameter obtaining module, a parameter calculating module, a parameter modifying module and a parameter comparing module; wherein,
the authentication process triggering module is used for triggering an authentication process;
the parameter acquisition module is used for acquiring parameters including the SQN issued by the core network;
the parameter calculation module is used for calculating protocol parameters used in the authentication algorithm of the core network according to the obtained SQN and calculating an IND value to be issued by the core network;
the parameter modifying module modifies the corresponding SEQ value according to the IND value calculated by the parameter calculating module;
and the parameter comparison module is used for comparing the SQN currently issued by the core network with the SEQ value modified by the parameter modification module and confirming whether the authentication process fails.
The core network further comprises a secondary authentication triggering module which calculates a new SQN issue according to the SQN reported in the mobile station synchronization failure and triggers the secondary authentication process.
The method and the system for triggering the synchronous failure of the authentication process provided by the invention have the advantages that the authentication parameters in the Universal Subscriber Identity Module (USIM) file of the mobile station are modified, so that the authentication parameter values of the mobile station and the network side are not in the range specified by a protocol, the triggering of the synchronous failure authentication process is realized, the method does not need to modify the authentication algorithm of a mobile phone or a core network, a special test version does not need to be made in the network compatibility test to support the test item for triggering the authentication process failure, and the method and the system are simple, convenient and flexible to realize. In addition, the method can be further used for verifying whether the core network supports secondary authentication in an Inter-Operability Test (IOT) of the wireless access system and the core network.
Drawings
Fig. 1 is a schematic diagram illustrating an implementation process of authentication in the prior art;
fig. 2 is a schematic flow chart of an implementation of the method of the present invention.
Detailed Description
Because the synchronization of the mobile station and the network is realized through the SQN at present, the basic idea of the invention is as follows: the SQN of the core network is obtained by triggering the authentication process twice, and then the authentication parameters in the USIM file of the mobile station are modified according to the obtained SQN, so that the triggering of the synchronization failure authentication process is realized. Specifically, the modification of the authentication parameter is to modify the SEQ value of the SQN.
Here, the triggering authentication process may be triggering by starting a mobile station, or triggering by initiating a circuit domain or packet domain service, or triggering by performing an attach of a general packet radio service.
Fig. 2 is a process of failing to trigger an authentication procedure and a failure reason is a synchronization failure according to an embodiment of the present invention, in this embodiment, the authentication procedure is triggered by starting a mobile station, as shown in fig. 2, a specific processing procedure of this embodiment includes the following steps:
step 201: and starting the mobile station to carry out IMSI attachment and triggering the authentication process.
Here, when the mobile station is a mobile phone, starting the mobile station is to turn on the mobile station. The following takes the mobile station as a handset as an example.
Step 202: and checking the SQN array in the USIM file of the mobile phone to obtain the latest SQN transmitted to the mobile phone by the core network.
Each mobile phone contains a USIM file, and the USIM file stores information related to safety, such as IMSI information, SQN information, key information, operation (op) information and the like; information related to mobility management, such as temporary mobile identity (TMSI) information, packet domain temporary mobile identity (PTMSI) information, Location Area Identity (LAI) numbers, etc., is also stored; wireless network parameter information such as frequency points, code words and the like; and other information. The invention mainly relates to SQN information which is generally obtained by a core network through a series of complex algorithms and directly issued to a mobile phone through authentication request information when the mobile phone is started to register or is attached.
Step 203: and after the mobile phone is powered off, the mobile phone is powered on again to carry out IMSI attachment, and the authentication process is triggered again to obtain the SQN which is issued to the mobile phone by the core network again.
Step 204: and the mobile phone calculates and obtains the protocol parameters used in the authentication algorithm of the core network according to the SQN issued by the core network twice.
In this step, the calculated protocol parameters are the SEQ value of the current SQN and the added value of the IND value to be used by SEQ issued by the next core network based on the previous IND value.
Because the SQN is actually a 32-dimensional array composed of SEQ [0], SEQ [ 1.......... SEQ [31], and the values of SEQ issued by the core network are incremented as specified by the protocol. Thus, the specific process of calculating the IND increase value is:
after the authentication process is triggered after the first startup, the maximum value of the current SEQ in the USIM file of the mobile phone is found, and the value is 100 if SEQ [3 ]; after the power is off and then on to trigger the authentication process, the core network issues a new SEQ value, and similarly finds the maximum value of the SEQ in the USIM file of the mobile phone, if the value is SEQ [8], and the value is 101, then the added value of the IND value is 5, which is obtained by subtracting the subscript 3 from the subscript 8. Therefore, the IND value in the SQN issued by the core network next time can be known to be 13, based on this, the SQN in the USIM file of the mobile phone is modified, namely the SEQ [13], the original value is assumed to be 80, which can be changed to 1000, generally, a much larger value can be set for ensuring the trigger, when the SQN is issued by the core network next time, because the value of the SEQ [13] is far less than 1000, the mobile phone can report the authentication failure to the core network.
Step 205: calculating the index number IND of the SQN to be issued next time by the core network;
in this step, according to the definition of the 3GPP protocol, the next IND value is obtained by adding a value smaller than 32 to the previous IND value, and then modulo 32, where the value smaller than 32 added on the previous IND value is the value calculated in step 204, and the next IND value to be issued by the core network can be obtained based on this.
Step 206: the mobile phone modifies the SEQ value indexed as the IND value to be issued by the core network in the SQN array of the USIM file of the mobile phone according to the IND value to be issued next by the core network calculated in step 205, and ensures that the corresponding value is greater than the SEQ value to be issued next by the core network; or, the corresponding value is smaller than the next-to-be-issued SEQ value of the core network by 28 powers of 2.
Here, it is practical to modify the next SEQ value to be issued to a value that does not satisfy the discrimination condition specified in the protocol, so that the authentication process fails when the device is turned on next time and the failure cause is synchronization failure. Specifically, according to the protocol specification, if the SEQ value is smaller than the set value, the size needs to be much smaller, the protocol specification is smaller by the power of 28 of 2, and the SEQ value cannot be a negative number, so the SEQ value cannot be modified to be smaller unless the issued SEQ value exceeds the power of 28 of 2, and generally, the SEQ value can be modified to be larger, and most of the SEQ values are not required. Moreover, the modified value of SEQ directly affects the SQN, so that the mobile phone and the network are asynchronous due to the inconsistency of the SQN.
Step 207: and (3) starting up for the third time after shutdown to attach the IMSI, triggering the authentication process for the third time, wherein at the moment, when the new SQN issued by the core network for the third time is compared with the SEQ value modified in the step 206, the new SQN issued by the core network for the third time is just smaller than the SEQ value modified in the step 206, and therefore, the triggering of the authentication synchronization failure is confirmed according to the stipulation of the protocol, namely, the authentication process fails and the failure reason is synchronization failure.
Further, after step 207, the mobile phone reports authentication synchronization failure to the core network, where the SQN of the current mobile phone side is carried, and if the core network supports secondary authentication, the core network generates a new SQN in the authentication center according to the SQN reported in the mobile phone synchronization failure, and then secondary authentication is implemented. Therefore, whether the core network supports secondary authentication can be further tested by utilizing the flow. Here, how to generate a new SQN belongs to the prior art, and is not described herein again.
In order to realize the method, the invention also provides a system for triggering the synchronization failure of the authentication process, which comprises a mobile station and a core network, wherein the mobile station comprises an authentication process triggering module, a parameter acquisition module, a parameter calculation module, a parameter modification module and a parameter comparison module, and the authentication process triggering module is used for triggering the authentication process; the parameter acquisition module is used for acquiring parameters such as SQN (sequence query number) issued by a core network; the parameter calculation module calculates protocol parameters used in the authentication algorithm of the core network according to the SQN obtained twice, and calculates the IND value to be issued by the core network; the parameter modifying module modifies the corresponding SEQ value according to the IND value calculated by the parameter calculating module; and the parameter comparison module is used for comparing the SQN currently issued by the core network with the SEQ value modified by the parameter modification module and confirming whether the authentication process fails.
Furthermore, the core network can also comprise a secondary authentication triggering module which calculates a new SQN issue according to the SQN reported in the mobile station synchronization failure and triggers the secondary authentication process.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (9)

1. A method for triggering synchronization failure in an authentication process, the method comprising:
calculating an index number IND value to be issued by a core network according to the sequence number SQN obtained by triggering the authentication process twice, and modifying a sequence number SEQ value corresponding to the IND in a universal subscriber identity module USIM file of the mobile station according to the calculated IND value; triggering the authentication process for the third time to obtain the synchronization failure of the authentication process.
2. The method of claim 1, wherein the triggering authentication procedure is triggered by initiating a mobile station, or by initiating a circuit domain or packet domain service, or by performing an attach of a general packet radio service.
3. The method of claim 1 or 2, wherein the retrieving SQN is retrieved from the mobile station's own USIM file.
4. The method according to claim 1 or 2, wherein the calculating the IND value to be issued is specifically: the added value of the IND value is calculated according to the SQN obtained twice, then the sum of the previous IND value and the added value is calculated, and then the sum is processed by a module 32 to obtain the IND value to be issued by the core network.
5. The method according to claim 4, wherein said modification of the SEQ values is in particular: modifying the SEQ value corresponding to the IND value to be issued in the USIM file of the mobile station into a value larger than the SEQ value to be issued by the core network; or modified to a 28 th power value that is 2 less than the next time the value of SEQ is to be delivered by the core network.
6. The method of claim 5, wherein the obtaining of the authentication procedure synchronization failure specifically comprises: and the mobile station compares the SQN issued by the core network for the third time with the modified SEQ value, and if the SQN issued by the core network for the third time is smaller than the modified SEQ value or is greater than the modified SEQ value by the power of 28 of 2, the mobile station returns authentication failure to the core network, and the failure reason is synchronization failure.
7. The method according to claim 1 or 2, characterized in that after failure of authentication, the method further comprises: the mobile station reports authentication synchronization failure to the core network, wherein the authentication synchronization failure carries the SQN of the current mobile station side, and the core network calculates new SQN issuing according to the SQN reported in the mobile station synchronization failure and triggers a secondary authentication process.
8. A system for triggering synchronization failure of authentication process comprises a mobile station and a core network, and is characterized in that the mobile station comprises an authentication process triggering module, a parameter obtaining module, a parameter calculating module, a parameter modifying module and a parameter comparing module; wherein,
the authentication process triggering module is used for triggering an authentication process;
the parameter acquisition module is used for acquiring parameters including the SQN issued by the core network;
the parameter calculation module is used for calculating protocol parameters used in the authentication algorithm of the core network according to the obtained SQN and calculating an IND value to be issued by the core network;
the parameter modifying module modifies the corresponding SEQ value according to the IND value calculated by the parameter calculating module;
and the parameter comparison module is used for comparing the SQN currently issued by the core network with the SEQ value modified by the parameter modification module and confirming whether the authentication process fails.
9. The system of claim 8, wherein the core network further comprises a secondary authentication triggering module for triggering a secondary authentication process by calculating a new SQN delivery according to the SQN reported in the synchronization failure of the mobile station.
CN2007101797393A 2007-12-17 2007-12-17 Method and system for triggering synchronous failure of authentication process Active CN101466096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101797393A CN101466096B (en) 2007-12-17 2007-12-17 Method and system for triggering synchronous failure of authentication process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101797393A CN101466096B (en) 2007-12-17 2007-12-17 Method and system for triggering synchronous failure of authentication process

Publications (2)

Publication Number Publication Date
CN101466096A true CN101466096A (en) 2009-06-24
CN101466096B CN101466096B (en) 2010-07-21

Family

ID=40806397

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101797393A Active CN101466096B (en) 2007-12-17 2007-12-17 Method and system for triggering synchronous failure of authentication process

Country Status (1)

Country Link
CN (1) CN101466096B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291757A (en) * 2011-07-01 2011-12-21 大唐移动通信设备有限公司 Method and equipment for testing conformance of terminal
WO2016086356A1 (en) * 2014-12-02 2016-06-09 华为技术有限公司 Authentication method within wireless communication network, related apparatus and system
CN106982432A (en) * 2017-03-29 2017-07-25 中国联合网络通信集团有限公司 It is a kind of to authenticate synchronous method and device
CN107229892A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of identification method of adjustment and equipment based on face recognition products
CN110839239A (en) * 2018-08-17 2020-02-25 中国电信股份有限公司 Authentication method, equipment and system
CN111182534A (en) * 2019-12-20 2020-05-19 翱捷科技(上海)有限公司 Mobile terminal and method for serial authentication of mobile terminal in WCDMA network

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0018950D0 (en) * 2000-08-02 2000-09-20 Vodafone Ltd Telecommunications systems and methods
EP1515507A1 (en) * 2003-09-09 2005-03-16 Axalto S.A. Authentication in data communication
CN100384120C (en) * 2004-09-30 2008-04-23 华为技术有限公司 Method for carrying out authentication for terminal user identification module in IP multimedia subsystem
CN100466806C (en) * 2005-04-11 2009-03-04 华为技术有限公司 Right discriminating method between mobile terminal and network equipment
CN100428848C (en) * 2005-05-31 2008-10-22 华为技术有限公司 Method for authenticating IP multi-media zone to terminal user mark module
CN100396156C (en) * 2005-07-26 2008-06-18 华为技术有限公司 Synchronous SQN processing method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291757A (en) * 2011-07-01 2011-12-21 大唐移动通信设备有限公司 Method and equipment for testing conformance of terminal
CN102291757B (en) * 2011-07-01 2014-04-02 大唐移动通信设备有限公司 Method and equipment for testing conformance of terminal
WO2016086356A1 (en) * 2014-12-02 2016-06-09 华为技术有限公司 Authentication method within wireless communication network, related apparatus and system
CN107229892A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of identification method of adjustment and equipment based on face recognition products
CN106982432A (en) * 2017-03-29 2017-07-25 中国联合网络通信集团有限公司 It is a kind of to authenticate synchronous method and device
CN106982432B (en) * 2017-03-29 2019-06-14 中国联合网络通信集团有限公司 A kind of method and device that authentication is synchronous
CN110839239A (en) * 2018-08-17 2020-02-25 中国电信股份有限公司 Authentication method, equipment and system
CN111182534A (en) * 2019-12-20 2020-05-19 翱捷科技(上海)有限公司 Mobile terminal and method for serial authentication of mobile terminal in WCDMA network
CN111182534B (en) * 2019-12-20 2020-10-13 翱捷科技股份有限公司 Mobile terminal and method for serial authentication of mobile terminal in WCDMA network

Also Published As

Publication number Publication date
CN101466096B (en) 2010-07-21

Similar Documents

Publication Publication Date Title
WO2020179665A1 (en) Method for synchronization of home network key
EP0977452B1 (en) Method for updating secret shared data in a wireless communication system
EP1758417B1 (en) Authentication method
CN100583767C (en) Key updating method and device
US9668139B2 (en) Secure negotiation of authentication capabilities
US8954739B2 (en) Efficient terminal authentication in telecommunication networks
EP1603361B1 (en) A self-synchronizing authentication and key agreement protocol
EP1001570A2 (en) Efficient authentication with key update
EP1829406B1 (en) Method for producing authentication information
CN101466096B (en) Method and system for triggering synchronous failure of authentication process
WO2009048574A2 (en) Secure wireless communication
CA2371365C (en) Integrity protection method for radio network signaling
EP2754311B1 (en) Mobile terminal theft detection system
KR20040053353A (en) Authentication of a mobile telephone
CN103781069A (en) Bidirectional-authentication method, device and system
CN103430582A (en) Prevention of eavesdropping type of attack in hybrid communication system
Ahmadian et al. New attacks on UMTS network access
CA3156911A1 (en) Wireless communication method for registration procedure
US8229398B2 (en) GSM authentication in a CDMA network
CN102111268B (en) Two-way authentication method of global system for mobile communications (GSM) network
CN107872793B (en) Base station identification method, terminal and server
CN1964259A (en) A method to manage secret key in the course of switch-over
KR20100012588A (en) Apparatus and method for authenticating mobile communication terminal
CN110557745A (en) System and method for managing locking of user equipment
EP4047969A1 (en) Enhancements for authentication in cellular communication networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant